Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 19:32 UTC

General

  • Target

    2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe

  • Size

    117KB

  • MD5

    ff7e57e2e03a0adbfb0c4f258a7c593d

  • SHA1

    5f9f4f7e977814ad9440509b60aeaa1fa04a2b5e

  • SHA256

    359759ba244aaeceb84d59f05c0954b8130c79d31f92ff1727e32d1ec7dad6ac

  • SHA512

    0b80f467a5ce6efc5d8fbe1f1153aa5d621dd4ffbe2ed95156e564cd8a56971246b17b962209d0789f704b5dde187d2600b71ecee9c3a9b7a1287c3581ee9bcb

  • SSDEEP

    3072:fiVTBTgQOX80I59VJ165J+S0YKx+wGCH:f2TgBX8j1S+S0YKxY

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 2 IoCs

    Bdaejec is backdoor written in C++.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\wEdkC.exe
      C:\Users\Admin\AppData\Local\Temp\wEdkC.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\5a450953.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3056

Network

  • flag-us
    DNS
    ddos.dnsnb8.net
    wEdkC.exe
    Remote address:
    8.8.8.8:53
    Request
    ddos.dnsnb8.net
    IN A
    Response
    ddos.dnsnb8.net
    IN A
    44.221.84.105
  • 44.221.84.105:799
    ddos.dnsnb8.net
    wEdkC.exe
    152 B
    3
  • 44.221.84.105:799
    ddos.dnsnb8.net
    wEdkC.exe
    152 B
    3
  • 44.221.84.105:799
    ddos.dnsnb8.net
    wEdkC.exe
    152 B
    3
  • 44.221.84.105:799
    ddos.dnsnb8.net
    wEdkC.exe
    152 B
    3
  • 44.221.84.105:799
    ddos.dnsnb8.net
    wEdkC.exe
    152 B
    3
  • 8.8.8.8:53
    ddos.dnsnb8.net
    dns
    wEdkC.exe
    61 B
    77 B
    1
    1

    DNS Request

    ddos.dnsnb8.net

    DNS Response

    44.221.84.105

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.ini

    Filesize

    39B

    MD5

    4473412e209558edbbe1ee4594da41d8

    SHA1

    f7917fe7abb229878192299724d910c434da8a30

    SHA256

    9c383677ecb7294392771f1bfc8b39b7cb75e210f22546eb25042af07b1fdab1

    SHA512

    8e1cea7ac1d03966b513d75087023b02295ed7bd359cd7198459b0232d45bbd869b664419165c19a51c130b2488c5f2b778097cd0d63b4044c64618a1f8c5a82

  • C:\Users\Admin\AppData\Local\Temp\5a450953.bat

    Filesize

    185B

    MD5

    4a86fb1f7ac083a46125e9456ba8453c

    SHA1

    be1e3aa9e8eb00ad87409b8619398b6380ed8b36

    SHA256

    f8bcaf5bded8ebe43a9a5ac2c04c00e5249fd9c6da668e9084276699e33c8c5c

    SHA512

    c825a3d0c1bf5a467bc3355e6586bc73dc4accc2be88721b0c9feb3754bbe03eab97629d131bc66f299412028de3e119b29b774bbbb561a1cdf81911003516de

  • \Users\Admin\AppData\Local\Temp\wEdkC.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • memory/2692-11-0x00000000000B0000-0x00000000000B9000-memory.dmp

    Filesize

    36KB

  • memory/2692-22-0x00000000000B0000-0x00000000000B9000-memory.dmp

    Filesize

    36KB

  • memory/2784-10-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

  • memory/2784-7-0x0000000000400000-0x0000000000C34000-memory.dmp

    Filesize

    8.2MB

  • memory/2784-12-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

  • memory/2784-19-0x0000000005B60000-0x0000000005B62000-memory.dmp

    Filesize

    8KB

  • memory/2784-21-0x0000000000400000-0x0000000000C34000-memory.dmp

    Filesize

    8.2MB

  • memory/2784-31-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

  • memory/2784-32-0x0000000000230000-0x0000000000239000-memory.dmp

    Filesize

    36KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.