Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
36s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/06/2024, 12:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NPLoader.exe
Resource
win11-20240419-en
3 signatures
150 seconds
General
-
Target
NPLoader.exe
-
Size
11.8MB
-
MD5
97f3bcb4bbe689cf6c389a655fc1dff9
-
SHA1
496eb7022d33177493a7600c9a2f8ef7ed262081
-
SHA256
cd4d052237893068f83ba8d073f95217dbe96c4a0373cf17427203c796cf6565
-
SHA512
7c42cb431b6e9998911070eb606e0d1e9db56b734f10167d72c15c24ec302c7d8d699035885e6b9ddd1592fa3095e16a2594a000b06a636a7e6fe74481b25981
-
SSDEEP
196608:gLygabBD8w5H2U3TSj/CzFkBdHtIT2qHNzJPKzTdAGebLqMAp0NMS6AXkrL3XnO7:gegabeAmj/CzFkLNIT2clJSzT6G2Lr6V
Score
1/10
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 2604 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4868 NPLoader.exe 4868 NPLoader.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4912 4868 NPLoader.exe 77 PID 4868 wrote to memory of 4912 4868 NPLoader.exe 77 PID 4912 wrote to memory of 1464 4912 cmd.exe 78 PID 4912 wrote to memory of 1464 4912 cmd.exe 78 PID 4912 wrote to memory of 348 4912 cmd.exe 79 PID 4912 wrote to memory of 348 4912 cmd.exe 79 PID 4912 wrote to memory of 132 4912 cmd.exe 80 PID 4912 wrote to memory of 132 4912 cmd.exe 80 PID 4868 wrote to memory of 2344 4868 NPLoader.exe 81 PID 4868 wrote to memory of 2344 4868 NPLoader.exe 81 PID 2344 wrote to memory of 4684 2344 cmd.exe 82 PID 2344 wrote to memory of 4684 2344 cmd.exe 82 PID 2344 wrote to memory of 2604 2344 cmd.exe 83 PID 2344 wrote to memory of 2604 2344 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\NPLoader.exe"C:\Users\Admin\AppData\Local\Temp\NPLoader.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\NPLoader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\NPLoader.exe" MD53⤵PID:1464
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:348
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C color b && title Error && echo Couldn't resolve host name && timeout /t 52⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\cmd.execmd /C color b3⤵PID:4684
-
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:2604
-
-