Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 20:15
Static task
static1
Behavioral task
behavioral1
Sample
27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe
Resource
win7-20240903-en
General
-
Target
27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe
-
Size
134KB
-
MD5
f59a71cc895dc3f7e0194dcad482e61a
-
SHA1
b7408de2e30bc3c304b23c6990661956f050e9e1
-
SHA256
27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674
-
SHA512
a33137ba3db208bf4aaa983fbcc21d46c37c32b2f503663f0848e7b7248f440de5ebb4a8ba77fb146d394ba656322251bbe6dcfc0ad6e5ab6c65c25bf3595897
-
SSDEEP
768:RuWGWvyDNo1sFBWfzdzemPV1KoukMt9Sbh9SbGDhwIMQGPL4vzZq2o9W7GsxBbPr:RufTDDWLdzBN1KlCDwIPGCq2iW7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2484-11-0x0000000000940000-0x0000000000949000-memory.dmp family_bdaejec_backdoor behavioral1/memory/2484-14-0x0000000000940000-0x0000000000949000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x0007000000012117-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2484 VRzw.exe -
Loads dropped DLL 2 IoCs
pid Process 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe VRzw.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe VRzw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe VRzw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE VRzw.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe VRzw.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE VRzw.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe VRzw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe VRzw.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe VRzw.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe VRzw.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe VRzw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe VRzw.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe VRzw.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe VRzw.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE VRzw.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE VRzw.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe VRzw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe VRzw.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe VRzw.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe VRzw.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe VRzw.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VRzw.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2484 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe 30 PID 1796 wrote to memory of 2484 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe 30 PID 1796 wrote to memory of 2484 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe 30 PID 1796 wrote to memory of 2484 1796 27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe"C:\Users\Admin\AppData\Local\Temp\27bd27be65060ccc7e3723e082fdf628f2cfb6535cb31d995df672dd362f3674.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\VRzw.exeC:\Users\Admin\AppData\Local\Temp\VRzw.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e