Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe
Resource
win10v2004-20240508-en
General
-
Target
64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe
-
Size
135KB
-
MD5
dee1abdbd2add3611e5a55909c9cc118
-
SHA1
c1df41d99f7e7208f6258cae987961823a18f305
-
SHA256
64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059
-
SHA512
64d570026ba705661edd2b82a9632ca85a6b381d3c1c6ab015ecc8b185f42956b91eef8f7c62620a009bdf6196586aff42f52d057074e5786048d0096edc2c41
-
SSDEEP
3072:Q39/WsTE859W958mTIK8Qr5+ViKGe7Yfs0a0Uoi:QcswxTIK9cViK4fs0l
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncldnkae.exe -
Executes dropped EXE 2 IoCs
pid Process 4464 Ncldnkae.exe 4256 Nkcmohbg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ncldnkae.exe 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe File opened for modification C:\Windows\SysWOW64\Ncldnkae.exe 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe File created C:\Windows\SysWOW64\Dlddhggk.dll 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Ncldnkae.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Ncldnkae.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4528 4256 WerFault.exe 82 -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlddhggk.dll" 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncldnkae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Ncldnkae.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4464 3564 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe 81 PID 3564 wrote to memory of 4464 3564 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe 81 PID 3564 wrote to memory of 4464 3564 64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe 81 PID 4464 wrote to memory of 4256 4464 Ncldnkae.exe 82 PID 4464 wrote to memory of 4256 4464 Ncldnkae.exe 82 PID 4464 wrote to memory of 4256 4464 Ncldnkae.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe"C:\Users\Admin\AppData\Local\Temp\64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\Ncldnkae.exeC:\Windows\system32\Ncldnkae.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe3⤵
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 4164⤵
- Program crash
PID:4528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4256 -ip 42561⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5a92442bbb444c31ead8ea4d18fea2e5c
SHA1cc8888cacbc8456fcfb03e960876bf76a155f221
SHA25632203017eaa9ad73504ecea9a25036023fd453ef6127e6cdbbab91e7cdce29f4
SHA512d8104b2daad492c65700c4b86cb0e29e894f52edcc39e19d62a5559bedae7abdc202fd8c438ce9e3fa41af264f089f7ac90501b256c76400f6a25d7e0a288c7a
-
Filesize
135KB
MD5f8088493cfb84edb08f1f0571ffeef2c
SHA1682d1b5ba9062434be87168ca69111b9c9f320f0
SHA2567a746b543840ee514d7202eacda184296c6c1af8970bebc35f75315a68f96591
SHA5122771f2073106111ef16dd0bf1f37d106b99ef6c84d0a1fe5908a7409384424116cec7cfccc225798cafe9eb89cba486efe4eb29bb7d20c0b5650c9abbdcf0684