Analysis
-
max time kernel
103s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 14:28
Static task
static1
Behavioral task
behavioral1
Sample
ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe
Resource
win7-20240903-en
General
-
Target
ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe
-
Size
146KB
-
MD5
ce6b04721edd46ab7b12be3a353d94cb
-
SHA1
70264211eba8694420f25a0e31722a9442fcfa4c
-
SHA256
ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060
-
SHA512
e76aeffb472e04b2ae67bafae5cd2682f068cad498310e0106cb040800bdb6f530c75b1d83283ce9638ad521dfaa9bdca009a8afb1f2b150a2c3888e253a0e9e
-
SSDEEP
3072:EEO9aq9pOM5nMCGJri8OioDw7LC89IAFF5J7P03xGCHW:EEO9aq97nkll5Vc3kV
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/1228-11-0x0000000000700000-0x0000000000709000-memory.dmp family_bdaejec_backdoor -
Downloads MZ/PE file 2 IoCs
flow pid Process 34 3664 Process not Found 53 3544 Process not Found -
resource yara_rule behavioral2/files/0x000c000000023b3c-4.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2508704002-2325818048-3575902788-1000\Control Panel\International\Geo\Nation piIRVc.exe -
Executes dropped EXE 1 IoCs
pid Process 1228 piIRVc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE piIRVc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe piIRVc.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE piIRVc.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe piIRVc.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe piIRVc.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe piIRVc.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{BF559B16-53E4-40BE-B7B4-0C7CB6E900BE}\chrome_installer.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe piIRVc.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe piIRVc.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe piIRVc.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE piIRVc.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe piIRVc.exe File opened for modification C:\Program Files\7-Zip\7zG.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe piIRVc.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe piIRVc.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe piIRVc.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe piIRVc.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe piIRVc.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE piIRVc.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe piIRVc.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe piIRVc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language piIRVc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3420 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1228 4720 ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe 86 PID 4720 wrote to memory of 1228 4720 ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe 86 PID 4720 wrote to memory of 1228 4720 ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe 86 PID 1228 wrote to memory of 2568 1228 piIRVc.exe 98 PID 1228 wrote to memory of 2568 1228 piIRVc.exe 98 PID 1228 wrote to memory of 2568 1228 piIRVc.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe"C:\Users\Admin\AppData\Local\Temp\ac9f955b869fee9cea9e602d790940589ff9e1f7930e0d4fb6bac8ad20882060.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\piIRVc.exeC:\Users\Admin\AppData\Local\Temp\piIRVc.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ea104c5.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource core1⤵
- System Location Discovery: System Language Discovery
PID:3876
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDk5RkI2NTEtRjA1Ny00MDdFLUE1OUMtOEQ4MTAzQUE5MUIwfSIgdXNlcmlkPSJ7QjY5Qzk1N0MtMDFDQi00RkYyLUIyMzctRDA0NDc3Q0Y3RTRDfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7OUUyMkRBODktNENBQy00Qjg3LTg1QUQtQkYyMzU2QkE0MzYwfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0NzM5NzcwNDYxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD58b6c53d95051d9771056b73a3011cfd9
SHA1ec81564a51553050f8382e6dee0bae89fe7d4e89
SHA256ebfa608d01249a09869af5ab8b360a2d583c20f20e10b1bcbd89dd1f447f4ab7
SHA512baaf74447f295d547ea269bcfd77a79931222ee33e9287cbc14d4c9b88534f9fa26efbc5e5664eb5f3c68771a08e498d0a0dbe8315eda79838d922afa78f9740
-
Filesize
187B
MD559358b94724fc300721ac79adc849b2f
SHA13926755a63978bf04f8f7e7ee0462aa479baa758
SHA256763be5ef35c5c59c7322ca714c231ccb52e8782a0cf22f6637d2655d19b0aefb
SHA512bbd66673d27ee39907ff6781bac7875bdc0b244f1caba411285a877f214523a96977ed47784b4ae08994276a5ab3c1344e61fcf4b170dc907c1beb75c8de6797
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e