Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 16:43
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe
-
Size
76KB
-
MD5
ffc8df5d3f73f41f1029c36dd10d17a7
-
SHA1
9071ba57bcf5d2d7db91f25804bacd9e71f172bd
-
SHA256
ddfb6c94f6064d3f0e83f4d577a526c1b1cd5779e9e21fab10ac5cecd8eecd23
-
SHA512
622bf8aa51b671bb829cf4ad60c10f52a3251b6bef1f501289489a25a63189d7fbd52d6cc2ba1d94715aa9ed894dc45a2226115d93ff7958b86013b1f365713e
-
SSDEEP
1536:cVMdRxy0K1vNy5GJqOppOesn6yGCq2iW7z:c+dRxyz1E3OH0VGCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4724-8-0x0000000000D20000-0x0000000000D29000-memory.dmp family_bdaejec_backdoor -
Downloads MZ/PE file 1 IoCs
flow pid Process 45 4560 Process not Found -
resource yara_rule behavioral2/files/0x000c000000023c91-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation rGFQZv.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 rGFQZv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe rGFQZv.exe File opened for modification C:\Program Files\dotnet\dotnet.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe rGFQZv.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe rGFQZv.exe File opened for modification C:\Program Files\7-Zip\7zG.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe rGFQZv.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe rGFQZv.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{6FDB5D73-D43A-4374-B99E-84A6FE01F856}\chrome_installer.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe rGFQZv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe rGFQZv.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe rGFQZv.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe rGFQZv.exe File opened for modification C:\Program Files\Windows Mail\wab.exe rGFQZv.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe rGFQZv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe rGFQZv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rGFQZv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5080 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1556 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe 1556 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4724 1556 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe 86 PID 1556 wrote to memory of 4724 1556 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe 86 PID 1556 wrote to memory of 4724 1556 2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe 86 PID 4724 wrote to memory of 1552 4724 rGFQZv.exe 106 PID 4724 wrote to memory of 1552 4724 rGFQZv.exe 106 PID 4724 wrote to memory of 1552 4724 rGFQZv.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-13_ffc8df5d3f73f41f1029c36dd10d17a7_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\rGFQZv.exeC:\Users\Admin\AppData\Local\Temp\rGFQZv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\781c7398.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTY1OTkxMjMxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5e283ae25914c7e5a0511284c711fdb49
SHA1d0da571ab7cd4ac91653082f1b6b4945254b2d5a
SHA2566ba334734e4629e4c88b964de17a69dfb204ecedd3fe8231386cd28102aa7fad
SHA51260f8b125fc95dc87141aa333cebf28bfcb8a22b3df23ee8e8c8be762f5f590b87b3fc25a227ea85b681c34e881bab2496188d76124de37a6b4557fba8789e320
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e