Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 19:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe
-
Size
117KB
-
MD5
ff7e57e2e03a0adbfb0c4f258a7c593d
-
SHA1
5f9f4f7e977814ad9440509b60aeaa1fa04a2b5e
-
SHA256
359759ba244aaeceb84d59f05c0954b8130c79d31f92ff1727e32d1ec7dad6ac
-
SHA512
0b80f467a5ce6efc5d8fbe1f1153aa5d621dd4ffbe2ed95156e564cd8a56971246b17b962209d0789f704b5dde187d2600b71ecee9c3a9b7a1287c3581ee9bcb
-
SSDEEP
3072:fiVTBTgQOX80I59VJ165J+S0YKx+wGCH:f2TgBX8j1S+S0YKxY
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4916-13-0x0000000000A30000-0x0000000000A39000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000b000000023c90-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wEdkC.exe -
Executes dropped EXE 1 IoCs
pid Process 4916 wEdkC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteshare.exe wEdkC.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe wEdkC.exe File opened for modification C:\Program Files\7-Zip\7zG.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe wEdkC.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe wEdkC.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE wEdkC.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE wEdkC.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe wEdkC.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe wEdkC.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe wEdkC.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe wEdkC.exe File opened for modification C:\Program Files\7-Zip\7z.exe wEdkC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wEdkC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4916 4184 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe 82 PID 4184 wrote to memory of 4916 4184 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe 82 PID 4184 wrote to memory of 4916 4184 2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe 82 PID 4916 wrote to memory of 5096 4916 wEdkC.exe 92 PID 4916 wrote to memory of 5096 4916 wEdkC.exe 92 PID 4916 wrote to memory of 5096 4916 wEdkC.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\wEdkC.exeC:\Users\Admin\AppData\Local\Temp\wEdkC.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\792560b1.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2025-01-22_ff7e57e2e03a0adbfb0c4f258a7c593d_smoke-loader_wapomi.ini
Filesize39B
MD5974e016a44c5509fc30cb2fea6509e6a
SHA140ac569506c97ab1bd1c26a8d0cd90a7af1687ae
SHA25636411c400483433b96c04b984e787b52470a423c4311771c267731be85c0bc53
SHA5128dbc3fd381637d929046ff1fd5536d55e7fb650e4ce9ef021dc85c5a0d16af5856340251086f8056870f5d7ec9b5486394be493394c27cef4f2ddb8afca5aa99
-
Filesize
185B
MD524d2408cfec17fd2aad210c35b0f65e5
SHA110d41647c990cd71fdd28950514a953bed1c99cc
SHA256724183e0f2a3e9ababba697d3bde5aa957a088d9e1496827436901e04a7284a4
SHA51226c4d189f6f80740aa244b5ad7c9f3a4fe8e3c9801aa5a2dbe13e8c13bca0b34a73356cfb3e0c849f179dc9975c2f8509d8a713faa9fcf7dd6084e3ed8627b12
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e