Analysis
-
max time kernel
110s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 04:35
Static task
static1
Behavioral task
behavioral1
Sample
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
Resource
win7-20240903-en
General
-
Target
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
-
Size
296KB
-
MD5
58a8dfb8445a6d57c7488c5a7642dd09
-
SHA1
add33aa5aeb180e51379956913f43d036612e351
-
SHA256
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5
-
SHA512
a026974191030952f9ee7f1eb1343b76bcfedd4385dfb5f605438c15884bc5e2692f4bfb2410308fc44028d1fb2c6d61a49d75ca2eb4aad3e2cb9601fe49deba
-
SSDEEP
6144:7MDcW16ZwIJssQ8Uy4UcYZVTc2rPzjJOHAOgxqqDLu2lt:7MDV1EEd+4UcUVTjPEHRqnu4
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2388-16-0x00000000011B0000-0x00000000011B9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000c00000001226d-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2388 jGPPdt.exe -
Loads dropped DLL 2 IoCs
pid Process 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe jGPPdt.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE jGPPdt.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe jGPPdt.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe jGPPdt.exe File opened for modification C:\Program Files\7-Zip\7zG.exe jGPPdt.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe jGPPdt.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe jGPPdt.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe jGPPdt.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jGPPdt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2388 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 31 PID 1924 wrote to memory of 2388 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 31 PID 1924 wrote to memory of 2388 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 31 PID 1924 wrote to memory of 2388 1924 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe"C:\Users\Admin\AppData\Local\Temp\da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\jGPPdt.exeC:\Users\Admin\AppData\Local\Temp\jGPPdt.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e