Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe
Resource
win7-20250207-en
General
-
Target
2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
62edabb05f1e4676cb4b97b5ea5e03fe
-
SHA1
c637706941c11eaff6ebe27c6eaca6e2d19d2fe5
-
SHA256
3b4fe060b41280d81f77eaa7fb9b893ce0ac2a9df8149b9d3aaed54b0d06f06c
-
SHA512
c9a191761568ac959fc9e7e7485d0cefd1ebdd94beea8b45835f58755643470ff8fe910b19683df63e0636e29c0312950bed16ecbf689f4c771e546a5cda4615
-
SSDEEP
1536:fHB0UxMkzOt7HcvJGt5AdHIOWnToIf12Z7mGCq2iW7z:fhAWJGSCTBf12ZaGCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/2184-8-0x0000000000F90000-0x0000000000F99000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000c000000023bc5-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation UQeRsEci.exe -
Executes dropped EXE 1 IoCs
pid Process 2184 UQeRsEci.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe UQeRsEci.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\OSE.EXE UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{54F378D2-0612-4081-AC3E-02AD5914C2CE}\chrome_installer.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE UQeRsEci.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe UQeRsEci.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe UQeRsEci.exe File opened for modification C:\Program Files\7-Zip\7z.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE UQeRsEci.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE UQeRsEci.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE UQeRsEci.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe UQeRsEci.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe UQeRsEci.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe UQeRsEci.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe UQeRsEci.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe UQeRsEci.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UQeRsEci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4228 wrote to memory of 2184 4228 2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe 83 PID 4228 wrote to memory of 2184 4228 2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe 83 PID 4228 wrote to memory of 2184 4228 2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe 83 PID 2184 wrote to memory of 836 2184 UQeRsEci.exe 95 PID 2184 wrote to memory of 836 2184 UQeRsEci.exe 95 PID 2184 wrote to memory of 836 2184 UQeRsEci.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-24_62edabb05f1e4676cb4b97b5ea5e03fe_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\UQeRsEci.exeC:\Users\Admin\AppData\Local\Temp\UQeRsEci.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\434c4f2c.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD5323a18886bc1eda643b3bd2ecc7ff96d
SHA10a1ba01cde82ca5fe9def63fcfa85f006004b6e2
SHA256fb40172a6ca5b4d38adc68561a578711a9d85b177caf4fc4db89b174bd545119
SHA512993a4a30cd13e03938def97b7beed216165bc00d0f6b7f94fbae1ee24194f4ac040ebb219b4314cb7827250c7565554ff9c50da07d03c9ae6b8cc52af90fde35
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e