Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 00:22
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe
Resource
win7-20241010-en
General
-
Target
2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe
-
Size
30.9MB
-
MD5
62771d14dc6dfcbd4983c454c3998cd1
-
SHA1
23b13ce96adc900ef8441a2abadec1576ec94982
-
SHA256
634dfaebef979ac17688f6f220972d3ceef866942e5e8ffa780d6200d67552d8
-
SHA512
00a7b361b8c84bbd4ccd239f9922172fead81acf5d8c243e914cde0e4bfc12cb03ff1f9a705f530dc7cef4bd6aa687f1c3026f5459c84fbf7f4352d712761c8b
-
SSDEEP
786432:o/dNSejkY0L9F0VOiGNcm+oI9I+pKrbItN:idNSe10Lr0VOiGObD9I+of
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4252-8-0x0000000000810000-0x0000000000819000-memory.dmp family_bdaejec_backdoor behavioral2/memory/4252-166-0x0000000000810000-0x0000000000819000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000c000000023b29-2.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Mpnv.exe -
Executes dropped EXE 2 IoCs
pid Process 4252 Mpnv.exe 4376 UpdateWizard.exe -
Loads dropped DLL 4 IoCs
pid Process 4376 UpdateWizard.exe 4376 UpdateWizard.exe 4376 UpdateWizard.exe 4376 UpdateWizard.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe Mpnv.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Mpnv.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe Mpnv.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe Mpnv.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE Mpnv.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe Mpnv.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Mpnv.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe Mpnv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE Mpnv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Mpnv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe Mpnv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe Mpnv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Mpnv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mpnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UpdateWizard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 4376 UpdateWizard.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4252 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 82 PID 3492 wrote to memory of 4252 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 82 PID 3492 wrote to memory of 4252 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 82 PID 3492 wrote to memory of 4376 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 83 PID 3492 wrote to memory of 4376 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 83 PID 3492 wrote to memory of 4376 3492 2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe 83 PID 4252 wrote to memory of 4840 4252 Mpnv.exe 84 PID 4252 wrote to memory of 4840 4252 Mpnv.exe 84 PID 4252 wrote to memory of 4840 4252 Mpnv.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Mpnv.exeC:\Users\Admin\AppData\Local\Temp\Mpnv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4a3e0391.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\7E58.tmp\UpdateWizard.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-02_62771d14dc6dfcbd4983c454c3998cd1_poet-rat_smoke-loader_wapomi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
183B
MD5b4523957248f027583bf024de9d28763
SHA18206c670d2aaa44d16a5353c807020728fca80c4
SHA256f484a29474ecc1492f71d2312de38125562e86c11165e83272f92ea3d3fc4ebe
SHA51288d65dabec0f93c7265f55c4b7adc53079c074ef4930e12fdb947981550deda2058e667c4b68badad7df86be0107125425eb7f0b34ded706637da3f7176ea49e
-
Filesize
2.3MB
MD586fe8fc2ff9172da91dbf00f97c7a0f9
SHA1e94c0e73fb5a693f266d32a599d72e2e442a2c45
SHA2567899b66c782a591997521dca0b89289a1309527f8dd49cbda10d1311b3bfb850
SHA512b459213832e311ae559447de13b483ea9775a9812edac4f9c5989a2e346cf8db45779c5399d74001564d18b18552b6e0ec861632582f1fbe3d90bccc20b1ff35
-
Filesize
9.1MB
MD524c25cb846bcb11c5192d6a12e993938
SHA1e8f845c1a992bffaf69711796d01967ea74ff1f0
SHA25676325dc7e45a10946f448018fde2cbf1e3c2330848ae8e37c248faec4ef1554c
SHA512b2f5e3d5fd638ebd45d4c8b9f8bd70798ad2a4f6afedbc5a6342e68b5e6650a6d112645b0ca94752935663a9123b21ec6c34c61d64305cadda68f0d9645a3dd6
-
Filesize
2KB
MD51c595f020ca68cd36544e1d583a3749c
SHA1106f7bc63b74ad8f4bfcabdc2657afb0fa9318c8
SHA25643df1f4573cbb765dd47153d8488d9708ed98fb3306896d8d833ce3391a0719d
SHA512a88dbd03135c1b2139b9e9f68cf6ffbd286dd268831d541f786b33781113c3cedfc63a7f2e757906a6b6ee7cf8004c13a375e0271e050e4b4d0878ff459cf903
-
Filesize
17.9MB
MD5325ee3cc165a769009e018156e4eb1d2
SHA1551034114762784468b902e8fa89def2f4d0ad89
SHA2565971adcbbe293000091732b95d76e8832e3da241a9c5877d3743751412588cfb
SHA512b37beb4560fce118b68629ed64e51eee09bdc49ad687869e7869a88c52ea922b9f2c26ed3f4fe5e816fe8cb158f4768840275e02e7845768e1f9d93e26fb2d29
-
Filesize
42KB
MD5c4b4409f186da70fcf2bcc60d5f05489
SHA1056663c9fd2851cd64f39d882f6758e7a987bd42
SHA256b35f2a8f4c8f1833f3cdec20739c58e295758ce22021d03d4335043148bd7610
SHA512cdcb945a82a0304e4d7cfc9ae9d7e5a5e81d4e3025e982494c87c283f6fac542181e9e1e3028456b9b0b5b6279990cb3e1a50f9df0f6e707c70fa0e23c7a808c
-
Filesize
11KB
MD5dbda60d92e774b4acb3b1cd71f909426
SHA166bfe06a16025f574323a0ce64dcc7c8216eb56c
SHA25656a59dae638d9bb45ce729a5d6fdfb0ecbe88b37047e4d6d20dbdef1fc90bd72
SHA512993a1f4af21cd5e13c3b8059cf483b10a58beb0d1777703ea07e9dcb5e7f681fa774e770abe9b6b4ca66b348997da0218d0ff67f18fcca1b3ca1ece2551d965a
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e