Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:22
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe
Resource
win7-20241010-en
General
-
Target
2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe
-
Size
30.9MB
-
MD5
62771d14dc6dfcbd4983c454c3998cd1
-
SHA1
23b13ce96adc900ef8441a2abadec1576ec94982
-
SHA256
634dfaebef979ac17688f6f220972d3ceef866942e5e8ffa780d6200d67552d8
-
SHA512
00a7b361b8c84bbd4ccd239f9922172fead81acf5d8c243e914cde0e4bfc12cb03ff1f9a705f530dc7cef4bd6aa687f1c3026f5459c84fbf7f4352d712761c8b
-
SSDEEP
786432:o/dNSejkY0L9F0VOiGNcm+oI9I+pKrbItN:idNSe10Lr0VOiGObD9I+of
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1012-12-0x0000000001090000-0x0000000001099000-memory.dmp family_bdaejec_backdoor behavioral1/memory/1012-159-0x0000000001090000-0x0000000001099000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000a00000001202c-1.dat aspack_v212_v242 behavioral1/memory/612-13-0x0000000000240000-0x0000000000249000-memory.dmp aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 1012 Mpnv.exe 2828 UpdateWizard.exe -
Loads dropped DLL 10 IoCs
pid Process 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe 2828 UpdateWizard.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Mpnv.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Mpnv.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Mpnv.exe File opened for modification C:\Program Files\7-Zip\7z.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Mpnv.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Mpnv.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe Mpnv.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe Mpnv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdateWizard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 2828 UpdateWizard.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 612 wrote to memory of 1012 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 28 PID 612 wrote to memory of 1012 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 28 PID 612 wrote to memory of 1012 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 28 PID 612 wrote to memory of 1012 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 28 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 612 wrote to memory of 2828 612 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 29 PID 1012 wrote to memory of 1896 1012 Mpnv.exe 31 PID 1012 wrote to memory of 1896 1012 Mpnv.exe 31 PID 1012 wrote to memory of 1896 1012 Mpnv.exe 31 PID 1012 wrote to memory of 1896 1012 Mpnv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Mpnv.exeC:\Users\Admin\AppData\Local\Temp\Mpnv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3e044ec8.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\9B27.tmp\UpdateWizard.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K0PVW9XR\k2[1].rar
Filesize4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
183B
MD548f7e5cb27bac6e4b4ccaa1f0a5ff7ac
SHA142d4126812d84b4fd87f6416769b5993110fc998
SHA256cd8c26f7ff0c20faceb4ac8428ab19a40ada3cb7aacc54fb9390b3f18bcf1d69
SHA512f7e83599ad6cb4ab27a9cbe6d29b33d84ffe917604b702b20af3b41423475d6769838f53f12b93a465cf96ad4584c8e7e51bb5212340f050a742d6d29e2ef061
-
Filesize
2.3MB
MD586fe8fc2ff9172da91dbf00f97c7a0f9
SHA1e94c0e73fb5a693f266d32a599d72e2e442a2c45
SHA2567899b66c782a591997521dca0b89289a1309527f8dd49cbda10d1311b3bfb850
SHA512b459213832e311ae559447de13b483ea9775a9812edac4f9c5989a2e346cf8db45779c5399d74001564d18b18552b6e0ec861632582f1fbe3d90bccc20b1ff35
-
Filesize
9.1MB
MD524c25cb846bcb11c5192d6a12e993938
SHA1e8f845c1a992bffaf69711796d01967ea74ff1f0
SHA25676325dc7e45a10946f448018fde2cbf1e3c2330848ae8e37c248faec4ef1554c
SHA512b2f5e3d5fd638ebd45d4c8b9f8bd70798ad2a4f6afedbc5a6342e68b5e6650a6d112645b0ca94752935663a9123b21ec6c34c61d64305cadda68f0d9645a3dd6
-
Filesize
2KB
MD51c595f020ca68cd36544e1d583a3749c
SHA1106f7bc63b74ad8f4bfcabdc2657afb0fa9318c8
SHA25643df1f4573cbb765dd47153d8488d9708ed98fb3306896d8d833ce3391a0719d
SHA512a88dbd03135c1b2139b9e9f68cf6ffbd286dd268831d541f786b33781113c3cedfc63a7f2e757906a6b6ee7cf8004c13a375e0271e050e4b4d0878ff459cf903
-
Filesize
42KB
MD5c4b4409f186da70fcf2bcc60d5f05489
SHA1056663c9fd2851cd64f39d882f6758e7a987bd42
SHA256b35f2a8f4c8f1833f3cdec20739c58e295758ce22021d03d4335043148bd7610
SHA512cdcb945a82a0304e4d7cfc9ae9d7e5a5e81d4e3025e982494c87c283f6fac542181e9e1e3028456b9b0b5b6279990cb3e1a50f9df0f6e707c70fa0e23c7a808c
-
Filesize
17.9MB
MD5325ee3cc165a769009e018156e4eb1d2
SHA1551034114762784468b902e8fa89def2f4d0ad89
SHA2565971adcbbe293000091732b95d76e8832e3da241a9c5877d3743751412588cfb
SHA512b37beb4560fce118b68629ed64e51eee09bdc49ad687869e7869a88c52ea922b9f2c26ed3f4fe5e816fe8cb158f4768840275e02e7845768e1f9d93e26fb2d29
-
Filesize
11KB
MD5dbda60d92e774b4acb3b1cd71f909426
SHA166bfe06a16025f574323a0ce64dcc7c8216eb56c
SHA25656a59dae638d9bb45ce729a5d6fdfb0ecbe88b37047e4d6d20dbdef1fc90bd72
SHA512993a1f4af21cd5e13c3b8059cf483b10a58beb0d1777703ea07e9dcb5e7f681fa774e770abe9b6b4ca66b348997da0218d0ff67f18fcca1b3ca1ece2551d965a
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e