Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 21:54 UTC

General

  • Target

    2ba628780fb6de28e7a6790f5b1c5c43_JC.exe

  • Size

    56KB

  • MD5

    2ba628780fb6de28e7a6790f5b1c5c43

  • SHA1

    108ddd9660dc417254432fb8c1a3c8fdb3c5860f

  • SHA256

    d871d9d0b453be0e5122a4e618e8375a9729c559264c9ad2852fc7bdbeebacdf

  • SHA512

    899d36b35d2a2b7991896aa8f961b2bcf5ea6f6e197ec38e5493b46e9cb742f39f10e926b02cf5159f6e1dbd3fbd4765f2d0eaf17623ddab0608c4b728f73069

  • SSDEEP

    768:cES7JjWTjKIgeVldkSESXmGVtFx8c8DW5FdSaWDrM/LO/q3rcqh42n3m2p/1H5V7:nOj8KIgeVLrXmGLFyaqDSO/6+03m2Lph

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 12 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ba628780fb6de28e7a6790f5b1c5c43_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2ba628780fb6de28e7a6790f5b1c5c43_JC.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\Mmldme32.exe
      C:\Windows\system32\Mmldme32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\Npagjpcd.exe
        C:\Windows\system32\Npagjpcd.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\Ngkogj32.exe
          C:\Windows\system32\Ngkogj32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Windows\SysWOW64\Nlhgoqhh.exe
            C:\Windows\system32\Nlhgoqhh.exe
            5⤵
            • Executes dropped EXE
            PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Mmldme32.exe

    Filesize

    56KB

    MD5

    63630157b7ce7fc8d83e2ac8626bfb19

    SHA1

    dfcc729f9995a120e4b333d07f6de266d8146cc7

    SHA256

    7c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6

    SHA512

    5741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089

  • C:\Windows\SysWOW64\Mmldme32.exe

    Filesize

    56KB

    MD5

    63630157b7ce7fc8d83e2ac8626bfb19

    SHA1

    dfcc729f9995a120e4b333d07f6de266d8146cc7

    SHA256

    7c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6

    SHA512

    5741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089

  • C:\Windows\SysWOW64\Mmldme32.exe

    Filesize

    56KB

    MD5

    63630157b7ce7fc8d83e2ac8626bfb19

    SHA1

    dfcc729f9995a120e4b333d07f6de266d8146cc7

    SHA256

    7c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6

    SHA512

    5741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    56KB

    MD5

    905e83f501fadb4306b0b96a2fab3a00

    SHA1

    a051e85a3f7da3f124886ec0a96d6d90119a788b

    SHA256

    c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7

    SHA512

    cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    56KB

    MD5

    905e83f501fadb4306b0b96a2fab3a00

    SHA1

    a051e85a3f7da3f124886ec0a96d6d90119a788b

    SHA256

    c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7

    SHA512

    cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca

  • C:\Windows\SysWOW64\Ngkogj32.exe

    Filesize

    56KB

    MD5

    905e83f501fadb4306b0b96a2fab3a00

    SHA1

    a051e85a3f7da3f124886ec0a96d6d90119a788b

    SHA256

    c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7

    SHA512

    cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    56KB

    MD5

    19e09df3043c3a29a9c0a4363bdf6b03

    SHA1

    fc9b05d1fd39ff5befea6f70eb875b8563504a7e

    SHA256

    f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6

    SHA512

    6e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    56KB

    MD5

    19e09df3043c3a29a9c0a4363bdf6b03

    SHA1

    fc9b05d1fd39ff5befea6f70eb875b8563504a7e

    SHA256

    f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6

    SHA512

    6e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422

  • C:\Windows\SysWOW64\Npagjpcd.exe

    Filesize

    56KB

    MD5

    e2eac996fc072125b7ee5131d0543967

    SHA1

    2496c5236a879f43b051b5a55effdac3f29812d9

    SHA256

    c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da

    SHA512

    ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68

  • C:\Windows\SysWOW64\Npagjpcd.exe

    Filesize

    56KB

    MD5

    e2eac996fc072125b7ee5131d0543967

    SHA1

    2496c5236a879f43b051b5a55effdac3f29812d9

    SHA256

    c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da

    SHA512

    ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68

  • C:\Windows\SysWOW64\Npagjpcd.exe

    Filesize

    56KB

    MD5

    e2eac996fc072125b7ee5131d0543967

    SHA1

    2496c5236a879f43b051b5a55effdac3f29812d9

    SHA256

    c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da

    SHA512

    ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68

  • \Windows\SysWOW64\Mmldme32.exe

    Filesize

    56KB

    MD5

    63630157b7ce7fc8d83e2ac8626bfb19

    SHA1

    dfcc729f9995a120e4b333d07f6de266d8146cc7

    SHA256

    7c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6

    SHA512

    5741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089

  • \Windows\SysWOW64\Mmldme32.exe

    Filesize

    56KB

    MD5

    63630157b7ce7fc8d83e2ac8626bfb19

    SHA1

    dfcc729f9995a120e4b333d07f6de266d8146cc7

    SHA256

    7c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6

    SHA512

    5741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089

  • \Windows\SysWOW64\Ngkogj32.exe

    Filesize

    56KB

    MD5

    905e83f501fadb4306b0b96a2fab3a00

    SHA1

    a051e85a3f7da3f124886ec0a96d6d90119a788b

    SHA256

    c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7

    SHA512

    cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca

  • \Windows\SysWOW64\Ngkogj32.exe

    Filesize

    56KB

    MD5

    905e83f501fadb4306b0b96a2fab3a00

    SHA1

    a051e85a3f7da3f124886ec0a96d6d90119a788b

    SHA256

    c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7

    SHA512

    cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    56KB

    MD5

    19e09df3043c3a29a9c0a4363bdf6b03

    SHA1

    fc9b05d1fd39ff5befea6f70eb875b8563504a7e

    SHA256

    f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6

    SHA512

    6e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422

  • \Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    56KB

    MD5

    19e09df3043c3a29a9c0a4363bdf6b03

    SHA1

    fc9b05d1fd39ff5befea6f70eb875b8563504a7e

    SHA256

    f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6

    SHA512

    6e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422

  • \Windows\SysWOW64\Npagjpcd.exe

    Filesize

    56KB

    MD5

    e2eac996fc072125b7ee5131d0543967

    SHA1

    2496c5236a879f43b051b5a55effdac3f29812d9

    SHA256

    c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da

    SHA512

    ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68

  • \Windows\SysWOW64\Npagjpcd.exe

    Filesize

    56KB

    MD5

    e2eac996fc072125b7ee5131d0543967

    SHA1

    2496c5236a879f43b051b5a55effdac3f29812d9

    SHA256

    c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da

    SHA512

    ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68

  • memory/1256-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1256-6-0x0000000000220000-0x0000000000255000-memory.dmp

    Filesize

    212KB

  • memory/1256-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2464-48-0x00000000002D0000-0x0000000000305000-memory.dmp

    Filesize

    212KB

  • memory/2464-40-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2464-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2720-32-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2792-55-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3044-20-0x00000000001B0000-0x00000000001E5000-memory.dmp

    Filesize

    212KB

  • memory/3044-56-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/3044-25-0x00000000001B0000-0x00000000001E5000-memory.dmp

    Filesize

    212KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.