Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
be58bb93c3d3c0ec2741c8546c989385
-
SHA1
c9dcb1b1fd160e5547a36d76bc59c05e66909e92
-
SHA256
c0b58666d46455cc422c2ed59ce676d6ec89fe56e5d908f63821022ec281a60e
-
SHA512
e93d6a14cf12b80e859a7a2fd408182b4c3ffbe7d59fc32b10aa0f70f01fdf31b7a7a36f7e36b17be68bd1d1cb46f9ad5a5f7f9e78575f453959e1cb6eb3f8e9
-
SSDEEP
1536:Yg/6/tM8NXDjPX0QWlfGMckTQEmGCq2iW7z:Hk3U8kTQ3GCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1284-14-0x0000000001220000-0x0000000001229000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x00080000000120ff-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1284 jsim.exe -
Loads dropped DLL 2 IoCs
pid Process 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe jsim.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe jsim.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE jsim.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE jsim.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe jsim.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe jsim.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe jsim.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe jsim.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe jsim.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe jsim.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe jsim.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe jsim.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe jsim.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe jsim.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE jsim.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe jsim.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe jsim.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe jsim.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE jsim.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe jsim.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe jsim.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe jsim.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe jsim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1284 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 30 PID 1588 wrote to memory of 1284 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 30 PID 1588 wrote to memory of 1284 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 30 PID 1588 wrote to memory of 1284 1588 2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe 30 PID 1284 wrote to memory of 1244 1284 jsim.exe 34 PID 1284 wrote to memory of 1244 1284 jsim.exe 34 PID 1284 wrote to memory of 1244 1284 jsim.exe 34 PID 1284 wrote to memory of 1244 1284 jsim.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-07_be58bb93c3d3c0ec2741c8546c989385_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\jsim.exeC:\Users\Admin\AppData\Local\Temp\jsim.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\357904d3.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD5471a61552abc9630620c6431f49a4c2d
SHA142dbc53918dfb3fddb3f775037caf812f2c2660b
SHA256eb27489648fd453c8c3463a05f7381fe0c483fb48e29693c8dcb3cc32c0b9983
SHA5126799b7f2d30ccf89d36d025367f9af76ad223e479e50789df8c26a4d61b4a8a88a4d3f36661f185d26e60e475c592c57d36e664c50f8ca84b49c3e3546745eef
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e