Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 22:35

General

  • Target

    64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe

  • Size

    135KB

  • MD5

    dee1abdbd2add3611e5a55909c9cc118

  • SHA1

    c1df41d99f7e7208f6258cae987961823a18f305

  • SHA256

    64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059

  • SHA512

    64d570026ba705661edd2b82a9632ca85a6b381d3c1c6ab015ecc8b185f42956b91eef8f7c62620a009bdf6196586aff42f52d057074e5786048d0096edc2c41

  • SSDEEP

    3072:Q39/WsTE859W958mTIK8Qr5+ViKGe7Yfs0a0Uoi:QcswxTIK9cViK4fs0l

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe
    "C:\Users\Admin\AppData\Local\Temp\64867e13c8eae6e3e35fcc37e0a443d8a0485f5ff85f063ac2051d5c8956f059.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\SysWOW64\Ncldnkae.exe
      C:\Windows\system32\Ncldnkae.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\Nkcmohbg.exe
        C:\Windows\system32\Nkcmohbg.exe
        3⤵
        • Executes dropped EXE
        PID:4256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 416
          4⤵
          • Program crash
          PID:4528
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4256 -ip 4256
    1⤵
      PID:1112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ncldnkae.exe

      Filesize

      135KB

      MD5

      a92442bbb444c31ead8ea4d18fea2e5c

      SHA1

      cc8888cacbc8456fcfb03e960876bf76a155f221

      SHA256

      32203017eaa9ad73504ecea9a25036023fd453ef6127e6cdbbab91e7cdce29f4

      SHA512

      d8104b2daad492c65700c4b86cb0e29e894f52edcc39e19d62a5559bedae7abdc202fd8c438ce9e3fa41af264f089f7ac90501b256c76400f6a25d7e0a288c7a

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      135KB

      MD5

      f8088493cfb84edb08f1f0571ffeef2c

      SHA1

      682d1b5ba9062434be87168ca69111b9c9f320f0

      SHA256

      7a746b543840ee514d7202eacda184296c6c1af8970bebc35f75315a68f96591

      SHA512

      2771f2073106111ef16dd0bf1f37d106b99ef6c84d0a1fe5908a7409384424116cec7cfccc225798cafe9eb89cba486efe4eb29bb7d20c0b5650c9abbdcf0684

    • memory/3564-0-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3564-5-0x0000000000432000-0x0000000000433000-memory.dmp

      Filesize

      4KB

    • memory/3564-20-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4256-16-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4256-18-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4464-9-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4464-19-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB