Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 22:46

General

  • Target

    NEAS.04478518d9714c9d108fed9484f29800.exe

  • Size

    422KB

  • MD5

    04478518d9714c9d108fed9484f29800

  • SHA1

    a97100d826dd03369880e180edf091a4bd39e652

  • SHA256

    afd92a84eabb59e3891beb6a668f55cd90142133284a68fafefe0d70107c8466

  • SHA512

    9d66c1fa837dfb2ee15bdd877e630552f7bfde3adea13a56482de77b17803ec2fb2c1e2902de6c41afca925123e736bfb524e3d9a1a529848af10b3451d4c7f6

  • SSDEEP

    6144:QWU2TF0GSbabO6FSPnvZU1AF+6FSPnvZhDYsKKo6FSPnvZU1AF+6FSPnvZq:QWU2TFoGaXgA4XfczXgA4XA

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.04478518d9714c9d108fed9484f29800.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.04478518d9714c9d108fed9484f29800.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3584
    • C:\Windows\SysWOW64\Cmqmma32.exe
      C:\Windows\system32\Cmqmma32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3304
  • C:\Windows\SysWOW64\Dhfajjoj.exe
    C:\Windows\system32\Dhfajjoj.exe
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\SysWOW64\Dopigd32.exe
      C:\Windows\system32\Dopigd32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Windows\SysWOW64\Dfnjafap.exe
        C:\Windows\system32\Dfnjafap.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Windows\SysWOW64\Dmgbnq32.exe
          C:\Windows\system32\Dmgbnq32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\SysWOW64\Dhocqigp.exe
            C:\Windows\system32\Dhocqigp.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1856
            • C:\Windows\SysWOW64\Dmllipeg.exe
              C:\Windows\system32\Dmllipeg.exe
              6⤵
              • Executes dropped EXE
              PID:5056
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 396
                7⤵
                • Program crash
                PID:1892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5056 -ip 5056
    1⤵
      PID:3912

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Cmqmma32.exe

      Filesize

      422KB

      MD5

      6f8d611bce4f544d806f0ae5410f4ed1

      SHA1

      126d2ca08bd9df51f57c8f68ba7a8f0468782749

      SHA256

      9e824e36b897f7f880f82318246e9c0883cfffd1d533dd2cc48fc52ce53270f3

      SHA512

      6575654ba6db35b301f305e5adcc82efe33441b6b2788ce169b294aa3ff2698e65c7ebc5a734528a30d0c2dde2512d22ad2f5ac2cbf7c666e80c6fc0624ac695

    • C:\Windows\SysWOW64\Cmqmma32.exe

      Filesize

      422KB

      MD5

      6f8d611bce4f544d806f0ae5410f4ed1

      SHA1

      126d2ca08bd9df51f57c8f68ba7a8f0468782749

      SHA256

      9e824e36b897f7f880f82318246e9c0883cfffd1d533dd2cc48fc52ce53270f3

      SHA512

      6575654ba6db35b301f305e5adcc82efe33441b6b2788ce169b294aa3ff2698e65c7ebc5a734528a30d0c2dde2512d22ad2f5ac2cbf7c666e80c6fc0624ac695

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      422KB

      MD5

      94d6d0aa850027da1e9fb5e061e158b8

      SHA1

      1bc5d0b26ea9a56ed8a81cbe17bdec956c75b69b

      SHA256

      5d0417e19acd6509347482932a3797df9c354d91fbb99b04d2e339302d2c5dd5

      SHA512

      c3d4f14d396780ad4b7eb0bc838e86ffae0d1939dcfd6a4c53201806b221f821e0067fe07066d31ba8c2edc9eebe52296b56ec6636d1ea8f5d2e20bd1abdf685

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      422KB

      MD5

      94d6d0aa850027da1e9fb5e061e158b8

      SHA1

      1bc5d0b26ea9a56ed8a81cbe17bdec956c75b69b

      SHA256

      5d0417e19acd6509347482932a3797df9c354d91fbb99b04d2e339302d2c5dd5

      SHA512

      c3d4f14d396780ad4b7eb0bc838e86ffae0d1939dcfd6a4c53201806b221f821e0067fe07066d31ba8c2edc9eebe52296b56ec6636d1ea8f5d2e20bd1abdf685

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      422KB

      MD5

      eccf84434f52f9d3f0e6f4794abab558

      SHA1

      e6e7c2f718442f32499c2d760584f93472023e36

      SHA256

      779cddf6537db10bd7c0afef1c194e499a92a37db893af9cce0cd9247ea9e3b5

      SHA512

      73c6202b17d9846e0ca60ca6b0ad69ec93c2aac143068246ac2eaeecf09d82428d9996caeab27ea38177aa813019b954441f3c6ff41c54d4ce57bff6192564e0

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      422KB

      MD5

      eccf84434f52f9d3f0e6f4794abab558

      SHA1

      e6e7c2f718442f32499c2d760584f93472023e36

      SHA256

      779cddf6537db10bd7c0afef1c194e499a92a37db893af9cce0cd9247ea9e3b5

      SHA512

      73c6202b17d9846e0ca60ca6b0ad69ec93c2aac143068246ac2eaeecf09d82428d9996caeab27ea38177aa813019b954441f3c6ff41c54d4ce57bff6192564e0

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      422KB

      MD5

      a7075341270dbd31d1ccb9ccbf4870fa

      SHA1

      4a65fe1520de3cf736fdca25c94d7ba90f042d2f

      SHA256

      2ae65d3d466e57b06ddf196d8174949aa3fbb1a0aaab14f61e75ffdbbbe85232

      SHA512

      e9db7a684e088ac38ae7e3bd657bcca90a580dff9017eb66ea3823bd6afc1e0a5c8e698c05d833ffb8f25de7f273c486e96b1bcbefb4d13051f6335ae1c62485

    • C:\Windows\SysWOW64\Dhocqigp.exe

      Filesize

      422KB

      MD5

      a7075341270dbd31d1ccb9ccbf4870fa

      SHA1

      4a65fe1520de3cf736fdca25c94d7ba90f042d2f

      SHA256

      2ae65d3d466e57b06ddf196d8174949aa3fbb1a0aaab14f61e75ffdbbbe85232

      SHA512

      e9db7a684e088ac38ae7e3bd657bcca90a580dff9017eb66ea3823bd6afc1e0a5c8e698c05d833ffb8f25de7f273c486e96b1bcbefb4d13051f6335ae1c62485

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      422KB

      MD5

      eb9a7ee9b845b368026226250f14631a

      SHA1

      a3790db6703496dd1e52369bcf1500b331e7b968

      SHA256

      774e0d0cd9ab123efac56b2cb157928bd3f750708d5794dfe16b7b35f5310eab

      SHA512

      8b4c5ce54568aaacca934a530a461983e88efdb3d23d20530f6e77cebff7b30a3e8584cae66d3ade2b5f1ba850e29afa89fd8b088ef96a97461deb2d141e925b

    • C:\Windows\SysWOW64\Dmgbnq32.exe

      Filesize

      422KB

      MD5

      eb9a7ee9b845b368026226250f14631a

      SHA1

      a3790db6703496dd1e52369bcf1500b331e7b968

      SHA256

      774e0d0cd9ab123efac56b2cb157928bd3f750708d5794dfe16b7b35f5310eab

      SHA512

      8b4c5ce54568aaacca934a530a461983e88efdb3d23d20530f6e77cebff7b30a3e8584cae66d3ade2b5f1ba850e29afa89fd8b088ef96a97461deb2d141e925b

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      422KB

      MD5

      b8dd7fac56b71731edceab62b3e79d08

      SHA1

      1b623ea2e627021a7b07ef3ec4534c3eaf8cb142

      SHA256

      9b5d09dd5a4cf4b3b46fc4893d028c9e0db4d0ffb7e9df6d693764b2d7549902

      SHA512

      f32dc4ec6d23f1b2b9a991ecfb010ee22c577e62432e3971d96f7a1626c28afe0da94a8f763f6882b7aa63de5bd587136fc65929c8a9e9689af08174186ae85a

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      422KB

      MD5

      b8dd7fac56b71731edceab62b3e79d08

      SHA1

      1b623ea2e627021a7b07ef3ec4534c3eaf8cb142

      SHA256

      9b5d09dd5a4cf4b3b46fc4893d028c9e0db4d0ffb7e9df6d693764b2d7549902

      SHA512

      f32dc4ec6d23f1b2b9a991ecfb010ee22c577e62432e3971d96f7a1626c28afe0da94a8f763f6882b7aa63de5bd587136fc65929c8a9e9689af08174186ae85a

    • C:\Windows\SysWOW64\Dopigd32.exe

      Filesize

      422KB

      MD5

      38e803fab45433dfb3836bed0ef79f60

      SHA1

      3c4b60134f93ce7703eea5a9a9302f2db45c574f

      SHA256

      fbc4fcbfb0f1d01527399237e80e6a3587a38923dfc9b89875c1e25f134a1456

      SHA512

      d21c5d45b357ef310d69eda68d68af190a40fb1db9dcdfa89d3606b002fae8d977305c6337d71dbd5b71d6e9c157b2fc0c7643468b1f7e656f52f94bd1311f80

    • C:\Windows\SysWOW64\Dopigd32.exe

      Filesize

      422KB

      MD5

      38e803fab45433dfb3836bed0ef79f60

      SHA1

      3c4b60134f93ce7703eea5a9a9302f2db45c574f

      SHA256

      fbc4fcbfb0f1d01527399237e80e6a3587a38923dfc9b89875c1e25f134a1456

      SHA512

      d21c5d45b357ef310d69eda68d68af190a40fb1db9dcdfa89d3606b002fae8d977305c6337d71dbd5b71d6e9c157b2fc0c7643468b1f7e656f52f94bd1311f80

    • memory/1856-48-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1856-61-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2580-70-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2580-20-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2940-63-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2940-40-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3304-8-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3304-71-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3584-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3584-72-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4228-23-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4228-68-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5056-59-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5056-56-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5092-65-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5092-32-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB