Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 16:48

General

  • Target

    bbc2ca16564d303949095dcfd6fd0eab.exe

  • Size

    595KB

  • MD5

    bbc2ca16564d303949095dcfd6fd0eab

  • SHA1

    10b1f3c28e22daf7dbe573ddebb51f033d702fbf

  • SHA256

    6624bd06266926f2c0edd899bcc7bc32afa9253a4811b72fcaecb1e87c11c2af

  • SHA512

    c7ff90104b9aeeb6240e96b85206b89d8fb7381ea995658437231d3e2406cb0a11717cacf5f4baa1d8c10eb34fb3fba9fa7cb2a5edf2ef79491b19074d9f28a9

  • SSDEEP

    12288:oJH3yHKujpV6yYPoBVgsPpV6yYPHGlElipV6yYPoBVgsPpV6yYPHGlm:o53yJWSPWHTiWSPWH5

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbc2ca16564d303949095dcfd6fd0eab.exe
    "C:\Users\Admin\AppData\Local\Temp\bbc2ca16564d303949095dcfd6fd0eab.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\Moidahcn.exe
      C:\Windows\system32\Moidahcn.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\Ngdifkpi.exe
        C:\Windows\system32\Ngdifkpi.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\Npagjpcd.exe
          C:\Windows\system32\Npagjpcd.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Windows\SysWOW64\Nlhgoqhh.exe
            C:\Windows\system32\Nlhgoqhh.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 140
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Ngdifkpi.exe

    Filesize

    595KB

    MD5

    135167728e6d27b446479a7750ea97a9

    SHA1

    fa5fa21d76c3b7d91e87bce6bb2ff24a7be16b0c

    SHA256

    7504cf9efcf5c379881115130cf06aa02f0d36dde1b75ced4c3890d059966531

    SHA512

    6029263a0b25e2765874caa9fc62308ec6573e1bd3ec39a4d24f3a69413b47390d7c9dbb3d1445779f07958a09410e26d10429cf251e7813e13da4c2f1ff8647

  • C:\Windows\SysWOW64\Nlhgoqhh.exe

    Filesize

    595KB

    MD5

    1e98b848e51d0ab4ff555f88a4491330

    SHA1

    8e42276848a15967934f9a8673a16784308c14bd

    SHA256

    8082b97130234418609cadb74f9c22a8b0e8a80dddb4e8d0c0e8d483ccdb9ad4

    SHA512

    f946a43e00cf53cf401b589a12c2b00b421f04ce88af97b659026ad3f13498a4deb445b14c525a2ef77bab79843f4a0612e8c87d807bb32ee316dc67e74f6174

  • C:\Windows\SysWOW64\Npagjpcd.exe

    Filesize

    595KB

    MD5

    584985106688d7a758f57273771f1674

    SHA1

    089cfa0531f2529b068c284a7f18352a700a3b91

    SHA256

    b39c578bb0ea6ab62d6306894482c9ee73e767fedc06dc4e1052acbc210fb78a

    SHA512

    badcadad91ac052681e0b77ae14349227f341c06d245e9e114a409023c148c1aa623a9b6737470039ccdc7c61d1c370d58be8ea988faf49d7e9531364f787570

  • \Windows\SysWOW64\Moidahcn.exe

    Filesize

    595KB

    MD5

    82352fe91bb8519474c6fbf54adfdf70

    SHA1

    8a37b4f254948929f7986b8689349fb76d366ece

    SHA256

    87ae867ff01018cd91de3de7020f725bfc7734ec2574d084b8ecbe1bce6170d3

    SHA512

    061245ff8de77d51b65d91b9a031b2243ecdf3efb5d018b3f97cc97002d08ea3833fa4b4f9f5d647ea223dcfcce87465c57d1c91392124445c206393daa7dc8b

  • memory/1740-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/1740-18-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/1740-6-0x00000000002E0000-0x0000000000313000-memory.dmp

    Filesize

    204KB

  • memory/1740-55-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2192-41-0x0000000000220000-0x0000000000253000-memory.dmp

    Filesize

    204KB

  • memory/2192-56-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2644-58-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2720-57-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB