Analysis
-
max time kernel
103s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 04:38
Static task
static1
General
-
Target
cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe
-
Size
124KB
-
MD5
63757cc7e0a218c05fd3cfc6a16736aa
-
SHA1
19a11c0ea2144e08d105ca11f699261d0ea8537f
-
SHA256
cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457
-
SHA512
a91629ee0ba7f8661096225d4f8a5769539e62c9e30c004163b0f8cf1d67d273c7116392c0998399bbbca4a0cd1e30677b59709f659d88efddac805ac5f978dd
-
SSDEEP
3072:11t7YTgCJXDiDJnmLkFlD9UCawY3MyiXHEKpUgbGCH:2cCJXkY93B8k6UZ
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/116-15-0x0000000000A00000-0x0000000000A09000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000400000002322e-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation TzoWql.exe -
Executes dropped EXE 1 IoCs
pid Process 116 TzoWql.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe TzoWql.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe TzoWql.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe TzoWql.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe TzoWql.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE TzoWql.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe TzoWql.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe TzoWql.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe TzoWql.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\chrome_pwa_launcher.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe TzoWql.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE TzoWql.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPPREARM.EXE TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe TzoWql.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe TzoWql.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe TzoWql.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe TzoWql.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe TzoWql.exe File opened for modification C:\Program Files\7-Zip\7z.exe TzoWql.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe TzoWql.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe TzoWql.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\chrmstp.exe TzoWql.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe TzoWql.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TzoWql.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3948 wrote to memory of 116 3948 cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe 88 PID 3948 wrote to memory of 116 3948 cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe 88 PID 3948 wrote to memory of 116 3948 cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe 88 PID 116 wrote to memory of 3900 116 TzoWql.exe 107 PID 116 wrote to memory of 3900 116 TzoWql.exe 107 PID 116 wrote to memory of 3900 116 TzoWql.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe"C:\Users\Admin\AppData\Local\Temp\cde56e97a0f8848109a5a6f4ad7421a070bdd572733c6256f2b75a3ba830f457.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\TzoWql.exeC:\Users\Admin\AppData\Local\Temp\TzoWql.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1cd54474.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3900
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5cf59d1add9bf9dea302dc108c4dcc6ed
SHA1f5ba56e945fa82bf6ac8da1dd813b2999e785364
SHA256f1f2a22f83c41e8e11284093d48418c0be8337653ea1beb4be56d85865a456bc
SHA512c57b04226bb49e4983de8f556f7e5ee88619650df9e0ee43973111211c6bad540ce6d4a7e6033ee0df14941e4aab81c2596ab21fd3241aa7345a54a147ea40e6
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e