Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe
Resource
win10v2004-20240508-en
General
-
Target
8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe
-
Size
94KB
-
MD5
d0ba181fb839fa8ff534143814f8469d
-
SHA1
02818e0f511ccaf93a33550470e22ed086e078ea
-
SHA256
8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9
-
SHA512
23d05b6a8b26ceff276d717e44c7ba06e22737e51739252c62aa48c00a4befc664af3c4ecce6743684a1f8c9c2e85a8da8332fd029efd05fe00602be2e1f4e03
-
SSDEEP
1536:V8fvvvg+dZspaTK5oH4YwRZIKZAUYJqmK7UAt8Aqi20ImZlY+/N5q+4nl0o28VM+:V8fnvg+opaTK5oH4YwRZIKZAJhAt3A0M
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Njcpee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnolfdcn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nqmhbpba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nkncdifl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ncihikcg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nnmopdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Njcpee32.exe -
Executes dropped EXE 7 IoCs
pid Process 4492 Nkncdifl.exe 1528 Nnmopdep.exe 208 Ncihikcg.exe 2988 Njcpee32.exe 3768 Nnolfdcn.exe 752 Nqmhbpba.exe 4100 Nkcmohbg.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nkncdifl.exe 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe File opened for modification C:\Windows\SysWOW64\Nnmopdep.exe Nkncdifl.exe File opened for modification C:\Windows\SysWOW64\Ncihikcg.exe Nnmopdep.exe File created C:\Windows\SysWOW64\Nkcmohbg.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Hnibdpde.dll Nqmhbpba.exe File created C:\Windows\SysWOW64\Nkncdifl.exe 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe File created C:\Windows\SysWOW64\Jkeang32.dll 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe File created C:\Windows\SysWOW64\Ncihikcg.exe Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Nnolfdcn.exe Njcpee32.exe File opened for modification C:\Windows\SysWOW64\Nkcmohbg.exe Nqmhbpba.exe File created C:\Windows\SysWOW64\Nnmopdep.exe Nkncdifl.exe File created C:\Windows\SysWOW64\Cgfgaq32.dll Nkncdifl.exe File created C:\Windows\SysWOW64\Njcpee32.exe Ncihikcg.exe File created C:\Windows\SysWOW64\Nnolfdcn.exe Njcpee32.exe File created C:\Windows\SysWOW64\Bghhihab.dll Nnolfdcn.exe File created C:\Windows\SysWOW64\Pkckjila.dll Nnmopdep.exe File opened for modification C:\Windows\SysWOW64\Njcpee32.exe Ncihikcg.exe File created C:\Windows\SysWOW64\Ddpfgd32.dll Ncihikcg.exe File created C:\Windows\SysWOW64\Cknpkhch.dll Njcpee32.exe File created C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe File opened for modification C:\Windows\SysWOW64\Nqmhbpba.exe Nnolfdcn.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2592 4100 WerFault.exe 87 -
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cgfgaq32.dll" Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bghhihab.dll" Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jkeang32.dll" 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pkckjila.dll" Nnmopdep.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ncihikcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njcpee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nqmhbpba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Hnibdpde.dll" Nqmhbpba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkncdifl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ddpfgd32.dll" Ncihikcg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Njcpee32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnolfdcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nnolfdcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Nkncdifl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nnmopdep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Cknpkhch.dll" Njcpee32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4492 4568 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe 81 PID 4568 wrote to memory of 4492 4568 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe 81 PID 4568 wrote to memory of 4492 4568 8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe 81 PID 4492 wrote to memory of 1528 4492 Nkncdifl.exe 82 PID 4492 wrote to memory of 1528 4492 Nkncdifl.exe 82 PID 4492 wrote to memory of 1528 4492 Nkncdifl.exe 82 PID 1528 wrote to memory of 208 1528 Nnmopdep.exe 83 PID 1528 wrote to memory of 208 1528 Nnmopdep.exe 83 PID 1528 wrote to memory of 208 1528 Nnmopdep.exe 83 PID 208 wrote to memory of 2988 208 Ncihikcg.exe 84 PID 208 wrote to memory of 2988 208 Ncihikcg.exe 84 PID 208 wrote to memory of 2988 208 Ncihikcg.exe 84 PID 2988 wrote to memory of 3768 2988 Njcpee32.exe 85 PID 2988 wrote to memory of 3768 2988 Njcpee32.exe 85 PID 2988 wrote to memory of 3768 2988 Njcpee32.exe 85 PID 3768 wrote to memory of 752 3768 Nnolfdcn.exe 86 PID 3768 wrote to memory of 752 3768 Nnolfdcn.exe 86 PID 3768 wrote to memory of 752 3768 Nnolfdcn.exe 86 PID 752 wrote to memory of 4100 752 Nqmhbpba.exe 87 PID 752 wrote to memory of 4100 752 Nqmhbpba.exe 87 PID 752 wrote to memory of 4100 752 Nqmhbpba.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe"C:\Users\Admin\AppData\Local\Temp\8b68fc7bcf473ae22b6595293b1cc2c7a788eaf2dc758e60dc357631fc1306c9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\Nkncdifl.exeC:\Windows\system32\Nkncdifl.exe2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\Nnmopdep.exeC:\Windows\system32\Nnmopdep.exe3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\Ncihikcg.exeC:\Windows\system32\Ncihikcg.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\Njcpee32.exeC:\Windows\system32\Njcpee32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\Nnolfdcn.exeC:\Windows\system32\Nnolfdcn.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\Nqmhbpba.exeC:\Windows\system32\Nqmhbpba.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\Nkcmohbg.exeC:\Windows\system32\Nkcmohbg.exe8⤵
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 4129⤵
- Program crash
PID:2592
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4100 -ip 41001⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD56da3a416fbc660405b6359443aa8433e
SHA1a213329c80b1e267d1d31f985ef5106959c7c76e
SHA256d69c8654f23d74f612bb93d4f400131597cc968ada0cbf382fb104e240b5ff49
SHA51288a83c9acb288abfc59dba21c0c49ada014bb9575da38a1570feb41d5f224212c3d9ab3a49f6be9acc2cb90ecac6da9ca9e3a7d45defe6ae6fff13a0c2522b3e
-
Filesize
94KB
MD514203411503d65d4d667615915de090d
SHA14d76bebfde10ea905cdd6ef5026db06f6b50a8ec
SHA2567d60ffe51d0862458131e1c6ed4d3b253496dce8f562c373aacf377414ff3c9c
SHA51204f83ff3d98bdb8fd2b82db2f445fef0288806692a912f62c5dcf31af393f7afa64e33063fd69855f71e834ec37df11a6c2fcb5a1fbcd53487fa8db2b8c59d0e
-
Filesize
94KB
MD58d0ab308b1545f2b8ee7679dd51c7a3d
SHA1495f8e1e49fb1573b8c99a7799c386988f2ae31f
SHA2564cf2462a48b52d237cf4fd66c96b102b397eb059a1dcb88684dce5e62d765d50
SHA512e5528215ce53bdcd9c4e6676b63c3c70291116f8c6e177ad96ff27fbd763fde707322d3b212e38b43d5499c096342945ab4efeb0d71aa9ea6c4b3bdef7b69373
-
Filesize
94KB
MD59bf1dd149bc9319d8df0ecfbe414bcfb
SHA107427a357807e0bb4eef8016afe1fc4f0bd7f401
SHA256350434532904ae3323a95d34595c45f2e872d570eedff58a25753614e4c05f49
SHA5120b8c99054897cc1967660c9af35fc680cf2fef35457588cc725f295d5d599ef9790f4f8127fc8521c367b3e52aac5efd31b9d1f72e61839519b975eb31c95e6c
-
Filesize
94KB
MD5a552e3f9a1586d160e480d882722b5b9
SHA1a736feaf4255966d56c0e471fccc718cb9971c6d
SHA256730cb01e48b046204f7ae91456221a2d4376c858b454d47b26dd752e3b17d34e
SHA5124c3725beeec7f2f70f56a2f0c5aa679eb4cd83aefcd65d43843efb2151ffd4b12209ded52d8668e1ab10c4843997ae45b31d4f855707db031f3360803e7eb42d
-
Filesize
94KB
MD5fa02df7fc69e72457412c6f0a7b5a5a9
SHA1243efc31db4a3242d4b55e790e60e94fe8f8f351
SHA256ffa1d1e09d455a1197b7777fb610abc53000b7220a29db26ed60f2178f395200
SHA51224de0ebdd83c98dffe1eb61fa0a8b1fe75cd36163af6831aea1de7f9921075e64cc1b08108a3e22f15d638042b8ef05e2e431dca06da45814a916a46e212ede7
-
Filesize
94KB
MD5e8e013cedc33f8826a2c491df9ebe67a
SHA18f82cc8b251729c3175a636d87c0473ef246d00d
SHA25646435962fead383da86e0756a220495a9120d4d816e7552ca3d3cffb31e36157
SHA512f685acb265ed0f8d640ed7f865593dcaa2f52d7658556c7f51c840e56ebb2ae3c83e738b1646bcc28eb6c2f6bbbc8b0c1835a7ef104d02c78efa4e3fde8ff13d