Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe
Resource
win10v2004-20240508-en
General
-
Target
70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe
-
Size
55KB
-
MD5
cd556d708e2d3769769efcb435af27a1
-
SHA1
87460e2f8d15ad0b110483bab3e6e3224d97a95c
-
SHA256
70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c
-
SHA512
393aa76a8ab7867989b4971eb438433500c9fc5deaa559b988d533d40b20e08502190a787a41ebb96b8933607aaa631b1fabc4c60f21acd0f8a5c9f99c909146
-
SSDEEP
1536:Fi+vOtolxjc8qGXKiflSCu3Mvx18g2aNSoNSd0A3shxD6:Fi8O+bjbTa8lP3vj2aNXNW0A8hh
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ngedij32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nddkgonp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcpee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nbhkac32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nddkgonp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe -
Executes dropped EXE 7 IoCs
pid Process 1100 Nddkgonp.exe 944 Nkncdifl.exe 4780 Nbhkac32.exe 436 Ngedij32.exe 220 Njcpee32.exe 4372 Nqmhbpba.exe 4760 Nkcmohbg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\SysWOW64\Bghhihab.dll Njcpee32.exe File created C:\Windows\SysWOW64\Jkeang32.dll Nddkgonp.exe File created C:\Windows\SysWOW64\Nbhkac32.exe Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Ngedij32.exe Nbhkac32.exe File created C:\Windows\SysWOW64\Paadnmaq.dll Nbhkac32.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Nkncdifl.exe Nddkgonp.exe File created C:\Windows\SysWOW64\Ipkobd32.dll Nkncdifl.exe File created C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File created C:\Windows\SysWOW64\Ddpfgd32.dll Ngedij32.exe File opened for modification C:\Windows\SysWOW64\Njcpee32.exe Ngedij32.exe File created C:\Windows\SysWOW64\Jlnpomfk.dll 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe Nddkgonp.exe File opened for modification C:\Windows\SysWOW64\Nbhkac32.exe Nkncdifl.exe File created C:\Windows\SysWOW64\Ngedij32.exe Nbhkac32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Nqmhbpba.exe File created C:\Windows\SysWOW64\Nddkgonp.exe 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe File opened for modification C:\Windows\SysWOW64\Nddkgonp.exe 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Njcpee32.exe File opened for modification C:\Windows\SysWOW64\Nqmhbpba.exe Njcpee32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1416 4760 WerFault.exe 87 -
Modifies registry class 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghhihab.dll" Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkncdifl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ngedij32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ipkobd32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Paadnmaq.dll" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jlnpomfk.dll" 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nbhkac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpfgd32.dll" Ngedij32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqmhbpba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nddkgonp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njcpee32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1100 4864 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe 81 PID 4864 wrote to memory of 1100 4864 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe 81 PID 4864 wrote to memory of 1100 4864 70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe 81 PID 1100 wrote to memory of 944 1100 Nddkgonp.exe 82 PID 1100 wrote to memory of 944 1100 Nddkgonp.exe 82 PID 1100 wrote to memory of 944 1100 Nddkgonp.exe 82 PID 944 wrote to memory of 4780 944 Nkncdifl.exe 83 PID 944 wrote to memory of 4780 944 Nkncdifl.exe 83 PID 944 wrote to memory of 4780 944 Nkncdifl.exe 83 PID 4780 wrote to memory of 436 4780 Nbhkac32.exe 84 PID 4780 wrote to memory of 436 4780 Nbhkac32.exe 84 PID 4780 wrote to memory of 436 4780 Nbhkac32.exe 84 PID 436 wrote to memory of 220 436 Ngedij32.exe 85 PID 436 wrote to memory of 220 436 Ngedij32.exe 85 PID 436 wrote to memory of 220 436 Ngedij32.exe 85 PID 220 wrote to memory of 4372 220 Njcpee32.exe 86 PID 220 wrote to memory of 4372 220 Njcpee32.exe 86 PID 220 wrote to memory of 4372 220 Njcpee32.exe 86 PID 4372 wrote to memory of 4760 4372 Nqmhbpba.exe 87 PID 4372 wrote to memory of 4760 4372 Nqmhbpba.exe 87 PID 4372 wrote to memory of 4760 4372 Nqmhbpba.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe"C:\Users\Admin\AppData\Local\Temp\70304514ea5bd55d20c16ce0e8adb6cc9c69361e9292d41a9a28ccb460c0636c.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\Nddkgonp.exeC:\Windows\system32\Nddkgonp.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\Nbhkac32.exeC:\Windows\system32\Nbhkac32.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\Ngedij32.exeC:\Windows\system32\Ngedij32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe8⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 4009⤵
- Program crash
PID:1416
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4760 -ip 47601⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD55b0a6177eee8f15d54c1dcbab2ed8eba
SHA1d26c8211e21f4e3ea0e80b3e7c8907900799f10a
SHA256115da84590b4a6aea44f451832d5b666b1c0a91918c568ac32965cb9da799ba0
SHA5128a907da2afe395d4bb718e9cb424e1ee79779fe86cc698fec1a099efddf62249f117e230b4eadafaf9cc2ae06de679dbead5acc00a56f6be9b39c27557b64e07
-
Filesize
55KB
MD594766d1e935116a73af491448faa890a
SHA1aaf0fbc42bf5f2f646283993dc2af2d223d75770
SHA256cabd18736e4ba60dd2142e6b1092a8f6922b1ed91b58ffd88e6baadca370f6ea
SHA512c9680f4f6c8746e332b19396afbe01980f3b26f72127c37b65dd22dddfd78d880d1d2924f01df6117abcde3452f47b7f59c347a8e938ebccd3244e3f65d8c7ac
-
Filesize
55KB
MD5603b1c3ffa9db7166b14c666a56befb4
SHA1f94b1218c0f022bd2267a2d3fe1cd80625a1fb25
SHA2561558d946ed90f9d11da2bd1fe9bbbd367fc2713065be5474077e4e151b7a23b8
SHA51289a67ecd59b27fed1db1887024f903a7684705535a8374a83ca87084100dd2bdce8e11e20b98a80f47fb4d098299c386e466f541ce0597c88b7f15eeecee1044
-
Filesize
55KB
MD5eb9b8d497fd848a174f42f813260838b
SHA19827c1328bd7599388366330f201b002fc5fa442
SHA2560eba35137db12b12cdc40642e1cb74d73ee144a960e9c9bab030c5cc44d2390b
SHA5128d4f8d67941520a093080a86af2f3bc1075109e33a27eec9f3cf1cced34c322e0c57dd43949a06b4d7be034178fc4bbd44a8a3c4a10016b8109b3f79135506f1
-
Filesize
55KB
MD549a69b0f4636edb58581bbda59465bef
SHA138f5d0dcc26de0c26dc63a1b6db4b06258a0350d
SHA25662381af8e743ab41a6de27c2026753d3f551235db4f370dbfefec4b8e4fbe064
SHA512ce1397ca66713a0e130f4555da246b1e9a47b1889037700a7146cfd7bf1a57f4cb2175dc4a087c83072db756deb3fb21856821088afefce86a29728581aa1ed7
-
Filesize
55KB
MD5722f58e93014b99db88abcde4c7a4304
SHA119935654ffd9df9251c1f2aa1bc2fe4fe02f3879
SHA256da4b953e96b261abf1d04756ce9547e95d75b9d37ec469d7f32412b39a987e3b
SHA51286d10b0ebb92bfcbfdb6ea57bc1c6dd0b703a0a059e666b35e8ab4eb824872d3b46f31e91637336dddaf23a6f42eeee1f1ff525591139ffa3fe124aa3dea933e
-
Filesize
55KB
MD52a88fc6e79f47f6b674f92ce4d17c0b2
SHA1a436e15406811652a6d5632b9c73044bcb632403
SHA256eb04e98f5fd2bfc6d19f154aad9dd39b59cfac0fa753177cb37afcd793e16ccd
SHA512c83032b8dd7c2fb9561cafc0e169282f29222e89d5bc69ee41874748f45fc1d56b33e1142bcfd0e6e318f30bec4f60482ab13479dbdd494bb8f38da10010ff52