Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2025 16:26
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe
-
Size
53KB
-
MD5
0ba90127140db944785337af3074026f
-
SHA1
763e4901fc22b9ad9db894010679cc0ad8ba497b
-
SHA256
4ff3c774961af4d772fe0804ddc8fc006c1e66939b596f54d89294bf72dad79a
-
SHA512
ad8c86c7e005b6a267d4f1d6c059149c29158eb3b3a860b366ec15e30521900523796e4b053d74967573cace2d9c3a67b931222182589bdc98e95aae9a7c4275
-
SSDEEP
768:WG9+z/gY6UpOe67IOvDLL6YreeDfBE0MElQGPL4vzZq2o9W7GsxBbPr:WI+/SqOeSDLReetMECGCq2iW7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4452-8-0x0000000000630000-0x0000000000639000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000d000000023b23-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4452 aQNDsS.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE aQNDsS.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe aQNDsS.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe aQNDsS.exe File opened for modification C:\Program Files\Windows Mail\wab.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe aQNDsS.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE aQNDsS.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe aQNDsS.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe aQNDsS.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe aQNDsS.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE aQNDsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe aQNDsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe aQNDsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE aQNDsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE aQNDsS.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aQNDsS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3876 MicrosoftEdgeUpdate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5096 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe 5096 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5096 wrote to memory of 4452 5096 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe 86 PID 5096 wrote to memory of 4452 5096 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe 86 PID 5096 wrote to memory of 4452 5096 2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-13_0ba90127140db944785337af3074026f_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\aQNDsS.exeC:\Users\Admin\AppData\Local\Temp\aQNDsS.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Nzk2NDk4ODgzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e