Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 21:54 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2ba628780fb6de28e7a6790f5b1c5c43_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2ba628780fb6de28e7a6790f5b1c5c43_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2ba628780fb6de28e7a6790f5b1c5c43_JC.exe
-
Size
56KB
-
MD5
2ba628780fb6de28e7a6790f5b1c5c43
-
SHA1
108ddd9660dc417254432fb8c1a3c8fdb3c5860f
-
SHA256
d871d9d0b453be0e5122a4e618e8375a9729c559264c9ad2852fc7bdbeebacdf
-
SHA512
899d36b35d2a2b7991896aa8f961b2bcf5ea6f6e197ec38e5493b46e9cb742f39f10e926b02cf5159f6e1dbd3fbd4765f2d0eaf17623ddab0608c4b728f73069
-
SSDEEP
768:cES7JjWTjKIgeVldkSESXmGVtFx8c8DW5FdSaWDrM/LO/q3rcqh42n3m2p/1H5V7:nOj8KIgeVLrXmGLFyaqDSO/6+03m2Lph
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngkogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngkogj32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mmldme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mmldme32.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npagjpcd.exe -
Executes dropped EXE 4 IoCs
pid Process 3044 Mmldme32.exe 2720 Npagjpcd.exe 2464 Ngkogj32.exe 2792 Nlhgoqhh.exe -
Loads dropped DLL 8 IoCs
pid Process 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 3044 Mmldme32.exe 3044 Mmldme32.exe 2720 Npagjpcd.exe 2720 Npagjpcd.exe 2464 Ngkogj32.exe 2464 Ngkogj32.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cgmgbeon.dll 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe File opened for modification C:\Windows\SysWOW64\Npagjpcd.exe Mmldme32.exe File opened for modification C:\Windows\SysWOW64\Ngkogj32.exe Npagjpcd.exe File created C:\Windows\SysWOW64\Kklcab32.dll Npagjpcd.exe File created C:\Windows\SysWOW64\Nlhgoqhh.exe Ngkogj32.exe File opened for modification C:\Windows\SysWOW64\Nlhgoqhh.exe Ngkogj32.exe File created C:\Windows\SysWOW64\Mmldme32.exe 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe File opened for modification C:\Windows\SysWOW64\Mmldme32.exe 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe File created C:\Windows\SysWOW64\Npagjpcd.exe Mmldme32.exe File created C:\Windows\SysWOW64\Mahqjm32.dll Mmldme32.exe File created C:\Windows\SysWOW64\Ngkogj32.exe Npagjpcd.exe File created C:\Windows\SysWOW64\Lamajm32.dll Ngkogj32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mmldme32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Npagjpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Npagjpcd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngkogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngkogj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgmgbeon.dll" 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mahqjm32.dll" Mmldme32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kklcab32.dll" Npagjpcd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Lamajm32.dll" Ngkogj32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mmldme32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1256 wrote to memory of 3044 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 28 PID 1256 wrote to memory of 3044 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 28 PID 1256 wrote to memory of 3044 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 28 PID 1256 wrote to memory of 3044 1256 2ba628780fb6de28e7a6790f5b1c5c43_JC.exe 28 PID 3044 wrote to memory of 2720 3044 Mmldme32.exe 29 PID 3044 wrote to memory of 2720 3044 Mmldme32.exe 29 PID 3044 wrote to memory of 2720 3044 Mmldme32.exe 29 PID 3044 wrote to memory of 2720 3044 Mmldme32.exe 29 PID 2720 wrote to memory of 2464 2720 Npagjpcd.exe 30 PID 2720 wrote to memory of 2464 2720 Npagjpcd.exe 30 PID 2720 wrote to memory of 2464 2720 Npagjpcd.exe 30 PID 2720 wrote to memory of 2464 2720 Npagjpcd.exe 30 PID 2464 wrote to memory of 2792 2464 Ngkogj32.exe 31 PID 2464 wrote to memory of 2792 2464 Ngkogj32.exe 31 PID 2464 wrote to memory of 2792 2464 Ngkogj32.exe 31 PID 2464 wrote to memory of 2792 2464 Ngkogj32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ba628780fb6de28e7a6790f5b1c5c43_JC.exe"C:\Users\Admin\AppData\Local\Temp\2ba628780fb6de28e7a6790f5b1c5c43_JC.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\Mmldme32.exeC:\Windows\system32\Mmldme32.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Npagjpcd.exeC:\Windows\system32\Npagjpcd.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\Ngkogj32.exeC:\Windows\system32\Ngkogj32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\Nlhgoqhh.exeC:\Windows\system32\Nlhgoqhh.exe5⤵
- Executes dropped EXE
PID:2792
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD563630157b7ce7fc8d83e2ac8626bfb19
SHA1dfcc729f9995a120e4b333d07f6de266d8146cc7
SHA2567c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6
SHA5125741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089
-
Filesize
56KB
MD563630157b7ce7fc8d83e2ac8626bfb19
SHA1dfcc729f9995a120e4b333d07f6de266d8146cc7
SHA2567c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6
SHA5125741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089
-
Filesize
56KB
MD563630157b7ce7fc8d83e2ac8626bfb19
SHA1dfcc729f9995a120e4b333d07f6de266d8146cc7
SHA2567c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6
SHA5125741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089
-
Filesize
56KB
MD5905e83f501fadb4306b0b96a2fab3a00
SHA1a051e85a3f7da3f124886ec0a96d6d90119a788b
SHA256c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7
SHA512cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca
-
Filesize
56KB
MD5905e83f501fadb4306b0b96a2fab3a00
SHA1a051e85a3f7da3f124886ec0a96d6d90119a788b
SHA256c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7
SHA512cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca
-
Filesize
56KB
MD5905e83f501fadb4306b0b96a2fab3a00
SHA1a051e85a3f7da3f124886ec0a96d6d90119a788b
SHA256c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7
SHA512cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca
-
Filesize
56KB
MD519e09df3043c3a29a9c0a4363bdf6b03
SHA1fc9b05d1fd39ff5befea6f70eb875b8563504a7e
SHA256f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6
SHA5126e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422
-
Filesize
56KB
MD519e09df3043c3a29a9c0a4363bdf6b03
SHA1fc9b05d1fd39ff5befea6f70eb875b8563504a7e
SHA256f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6
SHA5126e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422
-
Filesize
56KB
MD5e2eac996fc072125b7ee5131d0543967
SHA12496c5236a879f43b051b5a55effdac3f29812d9
SHA256c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da
SHA512ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68
-
Filesize
56KB
MD5e2eac996fc072125b7ee5131d0543967
SHA12496c5236a879f43b051b5a55effdac3f29812d9
SHA256c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da
SHA512ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68
-
Filesize
56KB
MD5e2eac996fc072125b7ee5131d0543967
SHA12496c5236a879f43b051b5a55effdac3f29812d9
SHA256c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da
SHA512ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68
-
Filesize
56KB
MD563630157b7ce7fc8d83e2ac8626bfb19
SHA1dfcc729f9995a120e4b333d07f6de266d8146cc7
SHA2567c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6
SHA5125741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089
-
Filesize
56KB
MD563630157b7ce7fc8d83e2ac8626bfb19
SHA1dfcc729f9995a120e4b333d07f6de266d8146cc7
SHA2567c084b4cdc1096c093459fe2f527c03d10027ac687f71869bf19c941097e68d6
SHA5125741bffc7e1c00e10402f873aa717b28ce63381ec0726db4d11d2613232db2d6f1fc1bf41df5eca399ca46481e087bc469bd0f9bd35a04d3d0ff7ab34ec2b089
-
Filesize
56KB
MD5905e83f501fadb4306b0b96a2fab3a00
SHA1a051e85a3f7da3f124886ec0a96d6d90119a788b
SHA256c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7
SHA512cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca
-
Filesize
56KB
MD5905e83f501fadb4306b0b96a2fab3a00
SHA1a051e85a3f7da3f124886ec0a96d6d90119a788b
SHA256c82473a0fe11ca677d73707462abef6393032eb02da65204130b08ac540ea4b7
SHA512cbe2b0a2a22d1241cd6711ff3d78705b40a34ea6f72b6a72a74cc29fefb619b85a18a67085795dc90c8ee98433fc4995dcd2fe9c2f5530102840a29d7c2521ca
-
Filesize
56KB
MD519e09df3043c3a29a9c0a4363bdf6b03
SHA1fc9b05d1fd39ff5befea6f70eb875b8563504a7e
SHA256f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6
SHA5126e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422
-
Filesize
56KB
MD519e09df3043c3a29a9c0a4363bdf6b03
SHA1fc9b05d1fd39ff5befea6f70eb875b8563504a7e
SHA256f841a648e03ca26c45a50ed97e2f1e838b65e77e806d1e45a830674d8fcaf7f6
SHA5126e26b770eb1f78a41c91bb4aa136271bb3d63d481e6626dde8638d214eb7dc68d481008099dc538d33b53eb674604bc849e267315e21845434e82b98419c0422
-
Filesize
56KB
MD5e2eac996fc072125b7ee5131d0543967
SHA12496c5236a879f43b051b5a55effdac3f29812d9
SHA256c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da
SHA512ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68
-
Filesize
56KB
MD5e2eac996fc072125b7ee5131d0543967
SHA12496c5236a879f43b051b5a55effdac3f29812d9
SHA256c5a390057298b7156efed1e66b0f2aa84702d549cc4b07bc4209b444d19576da
SHA512ec26a5104c8fbb2cf932bb657b9f9600b81e8ac592c3419600c3683ad5e53d38037bf8efffce42bc302b7118c76129ad5d832023162f297702d4965b69552f68