Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/06/2024, 00:13

General

  • Target

    8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe

  • Size

    94KB

  • MD5

    d0ba181fb839fa8ff534143814f8469d

  • SHA1

    02818e0f511ccaf93a33550470e22ed086e078ea

  • SHA256

    8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9

  • SHA512

    23d05b6a8b26ceff276d717e44c7ba06e22737e51739252c62aa48c00a4befc664af3c4ecce6743684a1f8c9c2e85a8da8332fd029efd05fe00602be2e1f4e03

  • SSDEEP

    1536:V8fvvvg+dZspaTK5oH4YwRZIKZAUYJqmK7UAt8Aqi20ImZlY+/N5q+4nl0o28VM+:V8fnvg+opaTK5oH4YwRZIKZAJhAt3A0M

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe
    "C:\Users\Admin\AppData\Local\Temp\8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Windows\SysWOW64\Nkncdifl.exe
      C:\Windows\system32\Nkncdifl.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:4492
      • C:\Windows\SysWOW64\Nnmopdep.exe
        C:\Windows\system32\Nnmopdep.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Windows\SysWOW64\Ncihikcg.exe
          C:\Windows\system32\Ncihikcg.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:208
          • C:\Windows\SysWOW64\Njcpee32.exe
            C:\Windows\system32\Njcpee32.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2988
            • C:\Windows\SysWOW64\Nnolfdcn.exe
              C:\Windows\system32\Nnolfdcn.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3768
              • C:\Windows\SysWOW64\Nqmhbpba.exe
                C:\Windows\system32\Nqmhbpba.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:752
                • C:\Windows\SysWOW64\Nkcmohbg.exe
                  C:\Windows\system32\Nkcmohbg.exe
                  8⤵
                  • Executes dropped EXE
                  PID:4100
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 412
                    9⤵
                    • Program crash
                    PID:2592
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 4100
    1⤵
      PID:1820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Ncihikcg.exe

      Filesize

      94KB

      MD5

      6da3a416fbc660405b6359443aa8433e

      SHA1

      a213329c80b1e267d1d31f985ef5106959c7c76e

      SHA256

      d69c8654f23d74f612bb93d4f400131597cc968ada0cbf382fb104e240b5ff49

      SHA512

      88a83c9acb288abfc59dba21c0c49ada014bb9575da38a1570feb41d5f224212c3d9ab3a49f6be9acc2cb90ecac6da9ca9e3a7d45defe6ae6fff13a0c2522b3e

    • C:\Windows\SysWOW64\Njcpee32.exe

      Filesize

      94KB

      MD5

      14203411503d65d4d667615915de090d

      SHA1

      4d76bebfde10ea905cdd6ef5026db06f6b50a8ec

      SHA256

      7d60ffe51d0862458131e1c6ed4d3b253496dce8f562c373aacf377414ff3c9c

      SHA512

      04f83ff3d98bdb8fd2b82db2f445fef0288806692a912f62c5dcf31af393f7afa64e33063fd69855f71e834ec37df11a6c2fcb5a1fbcd53487fa8db2b8c59d0e

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      94KB

      MD5

      8d0ab308b1545f2b8ee7679dd51c7a3d

      SHA1

      495f8e1e49fb1573b8c99a7799c386988f2ae31f

      SHA256

      4cf2462a48b52d237cf4fd66c96b102b397eb059a1dcb88684dce5e62d765d50

      SHA512

      e5528215ce53bdcd9c4e6676b63c3c70291116f8c6e177ad96ff27fbd763fde707322d3b212e38b43d5499c096342945ab4efeb0d71aa9ea6c4b3bdef7b69373

    • C:\Windows\SysWOW64\Nkncdifl.exe

      Filesize

      94KB

      MD5

      9bf1dd149bc9319d8df0ecfbe414bcfb

      SHA1

      07427a357807e0bb4eef8016afe1fc4f0bd7f401

      SHA256

      350434532904ae3323a95d34595c45f2e872d570eedff58a25753614e4c05f49

      SHA512

      0b8c99054897cc1967660c9af35fc680cf2fef35457588cc725f295d5d599ef9790f4f8127fc8521c367b3e52aac5efd31b9d1f72e61839519b975eb31c95e6c

    • C:\Windows\SysWOW64\Nnmopdep.exe

      Filesize

      94KB

      MD5

      a552e3f9a1586d160e480d882722b5b9

      SHA1

      a736feaf4255966d56c0e471fccc718cb9971c6d

      SHA256

      730cb01e48b046204f7ae91456221a2d4376c858b454d47b26dd752e3b17d34e

      SHA512

      4c3725beeec7f2f70f56a2f0c5aa679eb4cd83aefcd65d43843efb2151ffd4b12209ded52d8668e1ab10c4843997ae45b31d4f855707db031f3360803e7eb42d

    • C:\Windows\SysWOW64\Nnolfdcn.exe

      Filesize

      94KB

      MD5

      fa02df7fc69e72457412c6f0a7b5a5a9

      SHA1

      243efc31db4a3242d4b55e790e60e94fe8f8f351

      SHA256

      ffa1d1e09d455a1197b7777fb610abc53000b7220a29db26ed60f2178f395200

      SHA512

      24de0ebdd83c98dffe1eb61fa0a8b1fe75cd36163af6831aea1de7f9921075e64cc1b08108a3e22f15d638042b8ef05e2e431dca06da45814a916a46e212ede7

    • C:\Windows\SysWOW64\Nqmhbpba.exe

      Filesize

      94KB

      MD5

      e8e013cedc33f8826a2c491df9ebe67a

      SHA1

      8f82cc8b251729c3175a636d87c0473ef246d00d

      SHA256

      46435962fead383da86e0756a220495a9120d4d816e7552ca3d3cffb31e36157

      SHA512

      f685acb265ed0f8d640ed7f865593dcaa2f52d7658556c7f51c840e56ebb2ae3c83e738b1646bcc28eb6c2f6bbbc8b0c1835a7ef104d02c78efa4e3fde8ff13d

    • memory/208-61-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/208-25-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/752-58-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/752-48-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1528-17-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1528-62-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2988-60-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/2988-33-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/3768-45-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4100-57-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4100-59-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4492-8-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4492-63-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4568-4-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/4568-64-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/4568-2-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB