Analysis
-
max time kernel
106s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 04:58
Static task
static1
General
-
Target
2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
de12ab59f208b6caaddf0ee9d120ea6e
-
SHA1
33b9a9d73bfbadd1b7f7421a72fd6c53576833b9
-
SHA256
c6585e36a911f46f159985804f588b517adfba6ed10c15ddb7f13fa0c1b6e66b
-
SHA512
8bf48ae2e6a7bd6b6aa69eea0b97b26dab017c6596d5b4401eee58c25ab3edd719841c956bb16b4cdb8769e73bd04917de22107a3fa47c7073b2c59a4211e9f3
-
SSDEEP
1536:RfnLq01weW5yX3jFxv49Nu4GhQ5VGCq2iW7z:Y3ysTGhQ3GCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2860-8-0x0000000000650000-0x0000000000659000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000a0000000240c5-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation VpCXwAsS.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 VpCXwAsS.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe VpCXwAsS.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe VpCXwAsS.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\os_update_handler.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Windows Mail\wab.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe VpCXwAsS.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\chrmstp.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe VpCXwAsS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe VpCXwAsS.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe VpCXwAsS.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE VpCXwAsS.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe VpCXwAsS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe VpCXwAsS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VpCXwAsS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2860 2508 2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe 87 PID 2508 wrote to memory of 2860 2508 2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe 87 PID 2508 wrote to memory of 2860 2508 2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe 87 PID 2860 wrote to memory of 2388 2860 VpCXwAsS.exe 112 PID 2860 wrote to memory of 2388 2860 VpCXwAsS.exe 112 PID 2860 wrote to memory of 2388 2860 VpCXwAsS.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-07_de12ab59f208b6caaddf0ee9d120ea6e_rhadamanthys_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\VpCXwAsS.exeC:\Users\Admin\AppData\Local\Temp\VpCXwAsS.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4f096eb2.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD55e676a1cc533037c1aa3be9835c81656
SHA1fb965f1ddc8d71633979682c5ca82a5bd56f4ccc
SHA256d4ea6699715ef22123b96c82bf73727e226d29b5638b81041b4921a6a06eb330
SHA512873bd84d43ceedb95093b8071e9c62215ab6f25b38e02f7a460be16a117b5b1827a97a757d21f63364488756676b0093650bd22b251ff8acdb006a7cdb8f8ffd
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e