Analysis
-
max time kernel
110s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe
Resource
win7-20250207-en
General
-
Target
3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe
-
Size
538KB
-
MD5
69ab79a62c3d023470e715ff1221dfa0
-
SHA1
35320089dda64cb1883283d9cb7978e865656337
-
SHA256
3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4
-
SHA512
a370cd1ed57e31de31d86203b86ae02bb5a69af81fe04b5e3291ab960652035737b027771b526efe833d590d47a4a684e8b9e870c74122d1cf5cc1f3b9678f80
-
SSDEEP
12288:hrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUx9V:3ZyCA8CBmn+RrNj9ay5I
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/2876-46-0x00000000004F0000-0x00000000004F9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x001100000001edd3-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation NLKZEF.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 NLKZEF.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\RCX1AE.tmp 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\gjabswitch.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe NLKZEF.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe NLKZEF.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\InputPersonalization.exe.mui 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe NLKZEF.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe NLKZEF.exe File created C:\Program Files\Java\jdk-1.8\bin\gappletviewer.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\VideoLAN\VLC\guninstall.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\RCX26F.tmp 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\VideoLAN\VLC\guninstall.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe NLKZEF.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe NLKZEF.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe NLKZEF.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe NLKZEF.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\gMavInject32.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Microsoft Office\Office16\gOSPPREARM.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE NLKZEF.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe NLKZEF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe NLKZEF.exe File created C:\Program Files\7-Zip\7zG.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Windows Mail\wab.exe NLKZEF.exe File created C:\Program Files\Java\jdk-1.8\bin\gjavadoc.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe NLKZEF.exe File opened for modification C:\Program Files\7-Zip\g7zG.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Google\Chrome\Application\gchrome_proxy.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\gnotification_helper.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Source Engine\gOSE.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\misc.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe NLKZEF.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\gjdeps.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\gAppSharingHookController.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\VideoLAN\VLC\RCX2A2.tmp 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE NLKZEF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe NLKZEF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-1000-0000000FF1CE}\misc.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\gIntegratedOffice.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE NLKZEF.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE NLKZEF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe NLKZEF.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\accicons.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-1000-0000000FF1CE}\gmisc.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe NLKZEF.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe NLKZEF.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe NLKZEF.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\gOfficeC2RClient.ico 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\gVSTOInstaller.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\bfsvc.exe 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NLKZEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 2876 1144 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe 87 PID 1144 wrote to memory of 2876 1144 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe 87 PID 1144 wrote to memory of 2876 1144 3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe 87 PID 2876 wrote to memory of 3148 2876 NLKZEF.exe 89 PID 2876 wrote to memory of 3148 2876 NLKZEF.exe 89 PID 2876 wrote to memory of 3148 2876 NLKZEF.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe"C:\Users\Admin\AppData\Local\Temp\3f78157bc69d91b4651fb247534c48ab70d511c36565749199b5360bd850a6e4N.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\NLKZEF.exeC:\Users\Admin\AppData\Local\Temp\NLKZEF.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\60a75200.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD5c0863766b43569ec262c0bbacee4305f
SHA1503b920279e5fc25009cf7febed93525b4cd8572
SHA256009fd1477d6fff65817121657bebd1c0fcca6adf422420f44b7e8b078578852b
SHA512813dbf82b1fe025d08101fd15b7ae8106d6a1c43b3768906afa1171dece4c9fce54dab887257ea9ebc610db31d8a3d369fefa3446b94e490c65b06bf480d1f46
-
Filesize
31KB
MD56e47c6b3c03528483deda0e02741c0cb
SHA1a6770a2b6ce7708ad6cf1c1a8ebf739103da6b3c
SHA256e4e1f7ea88819702afba00fd29846bca59ffa5ce369c59a65b8a4e82b4942124
SHA512d1a65973edddceac3897fe91cf3655a1c65ea1705231117a6f38312411373ce855f01206016ad4862f69d58a5f656d2d448b112aaa34d37359472721d8246d03
-
Filesize
4KB
MD538b41d03e9dfcbbd08210c5f0b50ba71
SHA12fbfde75ce9fe8423d8e7720bf7408cedcb57a70
SHA256611f2cb2e03bd8dbcb584cd0a1c48accfba072dd3fc4e6d3144e2062553637f5
SHA512ec97556b6ff6023d9e6302ba586ef27b1b54fbf7e8ac04ff318aa4694f13ad343049210ef17b7b603963984c1340589665d67d9c65fec0f91053ff43b1401ba9
-
Filesize
4KB
MD53ea9bcbc01e1a652de5a6fc291a66d1a
SHA1aee490d53ee201879dff37503a0796c77642a792
SHA256a058bfd185fe714927e15642004866449bce425d34292a08af56d66cf03ebe6c
SHA5127c740132f026341770b6a20575786da581d8a31850d0d680978a00cc4dfca1e848ef9cdc32e51bae680ea13f6cc0d7324c38765cb4e26dcb2e423aced7da0501
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-1000-0000000FF1CE}\gmisc.ico
Filesize4KB
MD5fc27f73816c9f640d800cdc1c9294751
SHA1e6c3d8835d1de4e9606e5588e741cd1be27398f6
SHA2563cc5043caa157e5f9b1870527b8c323850bdae1e58d6760e4e895d2ab8a35a05
SHA5129e36b96acc97bc7cd45e67a47f1ae7ab7d3818cc2fdaad147524ce9e4baedfaac9cd012923ec65db763bfd850c65b497376bb0694508bee59747f97bf1591fd4
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5a1f514d7fd8155fb2a598492a8f37071
SHA1dcf620c48907333e2a2a7cef53b664ef63099027
SHA2567d3fb7c5cffdcfda7d4c2756a33de90c611d278939fa83ced11931e2b5acea73
SHA512ba50fe36ecb76db0859b19caa59136bf537bc238f827e7f49601787111f4055b31ed83b87b216dd9f0e20a7e3b5167a435372e823fcb116a3e93263015ae9cfc
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e