Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 22:49

General

  • Target

    70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe

  • Size

    55KB

  • MD5

    cd556d708e2d3769769efcb435af27a1

  • SHA1

    87460e2f8d15ad0b110483bab3e6e3224d97a95c

  • SHA256

    70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c

  • SHA512

    393aa76a8ab7867989b4971eb438433500c9fc5deaa559b988d533d40b20e08502190a787a41ebb96b8933607aaa631b1fabc4c60f21acd0f8a5c9f99c909146

  • SSDEEP

    1536:Fi+vOtolxjc8qGXKiflSCu3Mvx18g2aNSoNSd0A3shxD6:Fi8O+bjbTa8lP3vj2aNXNW0A8hh

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe
    "C:\Users\Admin\AppData\Local\Temp\70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Windows\SysWOW64\Nddkgonp.exe
      C:\Windows\system32\Nddkgonp.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\Nkncdifl.exe
        C:\Windows\system32\Nkncdifl.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\Nbhkac32.exe
          C:\Windows\system32\Nbhkac32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4780
          • C:\Windows\SysWOW64\Ngedij32.exe
            C:\Windows\system32\Ngedij32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:436
            • C:\Windows\SysWOW64\Njcpee32.exe
              C:\Windows\system32\Njcpee32.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:220
              • C:\Windows\SysWOW64\Nqmhbpba.exe
                C:\Windows\system32\Nqmhbpba.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:4372
                • C:\Windows\SysWOW64\Nkcmohbg.exe
                  C:\Windows\system32\Nkcmohbg.exe
                  8⤵
                  • Executes dropped EXE
                  PID:4760
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 400
                    9⤵
                    • Program crash
                    PID:1416
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4760 -ip 4760
    1⤵
      PID:4904

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Nbhkac32.exe

      Filesize

      55KB

      MD5

      5b0a6177eee8f15d54c1dcbab2ed8eba

      SHA1

      d26c8211e21f4e3ea0e80b3e7c8907900799f10a

      SHA256

      115da84590b4a6aea44f451832d5b666b1c0a91918c568ac32965cb9da799ba0

      SHA512

      8a907da2afe395d4bb718e9cb424e1ee79779fe86cc698fec1a099efddf62249f117e230b4eadafaf9cc2ae06de679dbead5acc00a56f6be9b39c27557b64e07

    • C:\Windows\SysWOW64\Nddkgonp.exe

      Filesize

      55KB

      MD5

      94766d1e935116a73af491448faa890a

      SHA1

      aaf0fbc42bf5f2f646283993dc2af2d223d75770

      SHA256

      cabd18736e4ba60dd2142e6b1092a8f6922b1ed91b58ffd88e6baadca370f6ea

      SHA512

      c9680f4f6c8746e332b19396afbe01980f3b26f72127c37b65dd22dddfd78d880d1d2924f01df6117abcde3452f47b7f59c347a8e938ebccd3244e3f65d8c7ac

    • C:\Windows\SysWOW64\Ngedij32.exe

      Filesize

      55KB

      MD5

      603b1c3ffa9db7166b14c666a56befb4

      SHA1

      f94b1218c0f022bd2267a2d3fe1cd80625a1fb25

      SHA256

      1558d946ed90f9d11da2bd1fe9bbbd367fc2713065be5474077e4e151b7a23b8

      SHA512

      89a67ecd59b27fed1db1887024f903a7684705535a8374a83ca87084100dd2bdce8e11e20b98a80f47fb4d098299c386e466f541ce0597c88b7f15eeecee1044

    • C:\Windows\SysWOW64\Njcpee32.exe

      Filesize

      55KB

      MD5

      eb9b8d497fd848a174f42f813260838b

      SHA1

      9827c1328bd7599388366330f201b002fc5fa442

      SHA256

      0eba35137db12b12cdc40642e1cb74d73ee144a960e9c9bab030c5cc44d2390b

      SHA512

      8d4f8d67941520a093080a86af2f3bc1075109e33a27eec9f3cf1cced34c322e0c57dd43949a06b4d7be034178fc4bbd44a8a3c4a10016b8109b3f79135506f1

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      55KB

      MD5

      49a69b0f4636edb58581bbda59465bef

      SHA1

      38f5d0dcc26de0c26dc63a1b6db4b06258a0350d

      SHA256

      62381af8e743ab41a6de27c2026753d3f551235db4f370dbfefec4b8e4fbe064

      SHA512

      ce1397ca66713a0e130f4555da246b1e9a47b1889037700a7146cfd7bf1a57f4cb2175dc4a087c83072db756deb3fb21856821088afefce86a29728581aa1ed7

    • C:\Windows\SysWOW64\Nkncdifl.exe

      Filesize

      55KB

      MD5

      722f58e93014b99db88abcde4c7a4304

      SHA1

      19935654ffd9df9251c1f2aa1bc2fe4fe02f3879

      SHA256

      da4b953e96b261abf1d04756ce9547e95d75b9d37ec469d7f32412b39a987e3b

      SHA512

      86d10b0ebb92bfcbfdb6ea57bc1c6dd0b703a0a059e666b35e8ab4eb824872d3b46f31e91637336dddaf23a6f42eeee1f1ff525591139ffa3fe124aa3dea933e

    • C:\Windows\SysWOW64\Nqmhbpba.exe

      Filesize

      55KB

      MD5

      2a88fc6e79f47f6b674f92ce4d17c0b2

      SHA1

      a436e15406811652a6d5632b9c73044bcb632403

      SHA256

      eb04e98f5fd2bfc6d19f154aad9dd39b59cfac0fa753177cb37afcd793e16ccd

      SHA512

      c83032b8dd7c2fb9561cafc0e169282f29222e89d5bc69ee41874748f45fc1d56b33e1142bcfd0e6e318f30bec4f60482ab13479dbdd494bb8f38da10010ff52

    • memory/220-40-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/220-62-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/436-32-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/436-66-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/944-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/944-68-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1100-70-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1100-8-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4372-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4372-47-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4760-55-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4760-59-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4780-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4780-24-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4864-72-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4864-0-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB