Analysis
-
max time kernel
111s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2025 04:35
Static task
static1
Behavioral task
behavioral1
Sample
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
Resource
win7-20240903-en
General
-
Target
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe
-
Size
296KB
-
MD5
58a8dfb8445a6d57c7488c5a7642dd09
-
SHA1
add33aa5aeb180e51379956913f43d036612e351
-
SHA256
da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5
-
SHA512
a026974191030952f9ee7f1eb1343b76bcfedd4385dfb5f605438c15884bc5e2692f4bfb2410308fc44028d1fb2c6d61a49d75ca2eb4aad3e2cb9601fe49deba
-
SSDEEP
6144:7MDcW16ZwIJssQ8Uy4UcYZVTc2rPzjJOHAOgxqqDLu2lt:7MDV1EEd+4UcUVTjPEHRqnu4
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4836-8-0x0000000000EE0000-0x0000000000EE9000-memory.dmp family_bdaejec_backdoor -
Downloads MZ/PE file 1 IoCs
flow pid Process 60 4012 Process not Found -
resource yara_rule behavioral2/files/0x000a000000023e19-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4836 jGPPdt.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe jGPPdt.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE jGPPdt.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe jGPPdt.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe jGPPdt.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxCalendarAppImm.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE jGPPdt.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe jGPPdt.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe jGPPdt.exe File opened for modification C:\Program Files\Windows Mail\wab.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe jGPPdt.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe jGPPdt.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe jGPPdt.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jGPPdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3472 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4836 4504 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 88 PID 4504 wrote to memory of 4836 4504 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 88 PID 4504 wrote to memory of 4836 4504 da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe"C:\Users\Admin\AppData\Local\Temp\da1ce3e3ba5a7fca265daa5df3155537d094e747a36e658ecde93265d1bb0fb5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\jGPPdt.exeC:\Users\Admin\AppData\Local\Temp\jGPPdt.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NzhFODk3OTEtRDdBRS00RDgwLThGMzktNkNEQzIyMjQ0MUU4fSIgdXNlcmlkPSJ7RTAwMTQwRjktNTFGMS00M0Y5LUJCQTktRkYxRTdCRTlGQThGfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NUQzNjU2NjAtODExQy00NDQ1LTg3NTMtQkYyRjdCNzA4NTU5fSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzY1NDYxNjM4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e