Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 02:34
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe
Resource
win7-20241010-en
General
-
Target
2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
be58bb93c3d3c0ec2741c8546c989385
-
SHA1
c9dcb1b1fd160e5547a36d76bc59c05e66909e92
-
SHA256
c0b58666d46455cc422c2ed59ce676d6ec89fe56e5d908f63821022ec281a60e
-
SHA512
e93d6a14cf12b80e859a7a2fd408182b4c3ffbe7d59fc32b10aa0f70f01fdf31b7a7a36f7e36b17be68bd1d1cb46f9ad5a5f7f9e78575f453959e1cb6eb3f8e9
-
SSDEEP
1536:Yg/6/tM8NXDjPX0QWlfGMckTQEmGCq2iW7z:Hk3U8kTQ3GCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1856-12-0x0000000000900000-0x0000000000909000-memory.dmp family_bdaejec_backdoor behavioral1/memory/1856-15-0x0000000000900000-0x0000000000909000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x00070000000120fc-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1856 jsim.exe -
Loads dropped DLL 2 IoCs
pid Process 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe jsim.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe jsim.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe jsim.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe jsim.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe jsim.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE jsim.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe jsim.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe jsim.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe jsim.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE jsim.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe jsim.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe jsim.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe jsim.exe File opened for modification C:\Program Files\7-Zip\7zG.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe jsim.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe jsim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 572 wrote to memory of 1856 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 29 PID 572 wrote to memory of 1856 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 29 PID 572 wrote to memory of 1856 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 29 PID 572 wrote to memory of 1856 572 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 29 PID 1856 wrote to memory of 3004 1856 jsim.exe 32 PID 1856 wrote to memory of 3004 1856 jsim.exe 32 PID 1856 wrote to memory of 3004 1856 jsim.exe 32 PID 1856 wrote to memory of 3004 1856 jsim.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\jsim.exeC:\Users\Admin\AppData\Local\Temp\jsim.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\683d2f85.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5f84e8a27619a866575a86800a4ec2f34
SHA1b111c8b3ee6083cf69cd5d2cd228623988e00877
SHA2565e6f2b3a3c988f7a5d0af4169219fb525c8eff2caf570ed33153c057a959f060
SHA51258ce630db523b739efb229ac6fef1b32e3d68fd49e8d4376b025ec662a8ed68967b8faa80f8df9850da338844e2359c00a896f58931f3fcc46070191572dca2a
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e