Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 02:58 UTC

General

  • Target

    cfcfe80e55db0f6064dd561e8721030f3d4aec760a0f40722ab079f27da930e6.exe

  • Size

    1.2MB

  • MD5

    06720322efc8173deb563348c7c129f3

  • SHA1

    7f1dfbd69ebfd1fa1ab9dc2606d1670cfdbb3117

  • SHA256

    cfcfe80e55db0f6064dd561e8721030f3d4aec760a0f40722ab079f27da930e6

  • SHA512

    1087b924a68f1fed29d0a03e2f6fd034ffe1b291d7a0fc7c4e8f1e325dfa73ef2abb18cd785a75817f2696a5a3c1eaecfc0951e131234b1f322b225e341352cd

  • SSDEEP

    12288:slVvLpHCXwpnsKvNA+XTvZHWuEo3oWbvrec:slVDlpsKv2EvZHp3oWbvrec

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in System32 directory 33 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfcfe80e55db0f6064dd561e8721030f3d4aec760a0f40722ab079f27da930e6.exe
    "C:\Users\Admin\AppData\Local\Temp\cfcfe80e55db0f6064dd561e8721030f3d4aec760a0f40722ab079f27da930e6.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\SysWOW64\Njogjfoj.exe
      C:\Windows\system32\Njogjfoj.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\Nafokcol.exe
        C:\Windows\system32\Nafokcol.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\SysWOW64\Nddkgonp.exe
          C:\Windows\system32\Nddkgonp.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4520
          • C:\Windows\SysWOW64\Ngcgcjnc.exe
            C:\Windows\system32\Ngcgcjnc.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Windows\SysWOW64\Nnmopdep.exe
              C:\Windows\system32\Nnmopdep.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\SysWOW64\Nqklmpdd.exe
                C:\Windows\system32\Nqklmpdd.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1640
                • C:\Windows\SysWOW64\Ngedij32.exe
                  C:\Windows\system32\Ngedij32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2940
                  • C:\Windows\SysWOW64\Njcpee32.exe
                    C:\Windows\system32\Njcpee32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:5008
                    • C:\Windows\SysWOW64\Nqmhbpba.exe
                      C:\Windows\system32\Nqmhbpba.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:3800
                      • C:\Windows\SysWOW64\Ndidbn32.exe
                        C:\Windows\system32\Ndidbn32.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:992
                        • C:\Windows\SysWOW64\Nkcmohbg.exe
                          C:\Windows\system32\Nkcmohbg.exe
                          12⤵
                          • Executes dropped EXE
                          PID:4732
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 228
                            13⤵
                            • Program crash
                            PID:3968
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4732 -ip 4732
    1⤵
      PID:3604

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      330 B
      5

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Cgfgaq32.dll

      Filesize

      7KB

      MD5

      75f28374a98a906f5ab75a22359a251e

      SHA1

      7664087b79e0b85660960d750451f5f392fe9556

      SHA256

      251d8f33311837a1ef61fa245503c4619c6d0697ba1c8536b4260a83873a1c6f

      SHA512

      8d134a4cc0c16150d20992c86389091d40f4e94b1bfad6589542c563b38bdff23716e6e5ed8c61eafb48def6d9657e68e2c0d18a1276621e8c5c9cf2a7b763f5

    • C:\Windows\SysWOW64\Nafokcol.exe

      Filesize

      1.2MB

      MD5

      4abd0d48d6ebbd8236afc23aacb34a9d

      SHA1

      03a16fbb2ec816f7ec310ca530fb98df1b236c27

      SHA256

      4668e2d0419dd51ca2ef56a1da61ca4ae25b0b853c29b2471981d5cfb4a19bed

      SHA512

      20bd04309a7e34bb52e61c08dbabf071ef36636aea6efc639a64f56ecc3b63107e9cdc1c2226dab6a7df41318036208a6b4e1ff0ce8349017dd830c4af62316a

    • C:\Windows\SysWOW64\Nddkgonp.exe

      Filesize

      1.2MB

      MD5

      b493ec8e9e2a657d7e279463edcf2084

      SHA1

      d3108d592845745d04ee30dbf0c207a7f55a66bc

      SHA256

      052d2d30a7b455c0f647c36e748e45390537fd7370e163243dde4e6c9a6dbe8a

      SHA512

      72009778cfd55589f459721f9e40a3d40ddaa7f9c581f3b025f987b8edf8b4ffdf50ce7721990c49699578c6cf964422582e84d9ed848b40c730b954464b4bc8

    • C:\Windows\SysWOW64\Ndidbn32.exe

      Filesize

      1.2MB

      MD5

      b19b7def0c8d30cd5bcbd0483b348ece

      SHA1

      fa74acc85ebd6d9d69972693f57004ab89c3219d

      SHA256

      69abdf8531ff3772c27443ef4ca441d9a7138023de0b4f67414095968125091a

      SHA512

      2e2920ef721a09081194ee7aea4bcf273b4181f6a68a4c9f38d2f1c073564b97d7b7c6224f0c897709d48eb3ebaaa85928d7695b2f47b4861581ad187f07bb5e

    • C:\Windows\SysWOW64\Ndidbn32.exe

      Filesize

      1.2MB

      MD5

      fa05d9f55ff9aab379cdc1774e4b784d

      SHA1

      7678040b8b29869c47a1e47ce86cd1896aff5b5d

      SHA256

      72d6b3257bd2bda256954f3b73d9638013fe75fda21ee2700dfb645a7e793376

      SHA512

      8c717b974da1f57a1ff257b4f1c7de34e2d39630770cd4b79b2098ee301b439680ceb6bedb73c0234c4c0666120d4ea31ada03b461ec4f697100304fa11bb28a

    • C:\Windows\SysWOW64\Ngcgcjnc.exe

      Filesize

      1.2MB

      MD5

      991c80148c281668d986f92edd95446e

      SHA1

      3027c7f43c42c698077e867d64074968c72b0e30

      SHA256

      68f3b3da01c7f9bd3e43596c847e2c124a1bd7437e8ca428ff1d68350b00ce08

      SHA512

      ade5217e5260c7c8acdf7c237f5d91c9b64f3458307ec32827cbaa8d8f1765d336732c7a3424d5778ad61711e71eb7792723c12cac82396e341f7712fbe62dc4

    • C:\Windows\SysWOW64\Ngedij32.exe

      Filesize

      1.2MB

      MD5

      571d1ae32eeb3a7b881ebf65b25fd52b

      SHA1

      40f918a4ce74fb27600456482465576e36516750

      SHA256

      831f348c4eba08c452f6c341fcfd15ab33034b62de7b32ffc10743da759376d1

      SHA512

      6acd44880058e0798d1d1d418e77e584e96fd98c501e372c86cf220c90bd3931ec06ee2b3997d4686adc7690e8644bae9394f226aa4328ccfc4ba8b58a92117b

    • C:\Windows\SysWOW64\Njcpee32.exe

      Filesize

      1.2MB

      MD5

      c25dcdadefa44b74e9cda4a049a26538

      SHA1

      38768c202be4c0efcce9dfdb22d5ec4ef3a03e5e

      SHA256

      d60881bf2195845c4a8c0292f5c8da55ba273347be5d87c0f0828ae788d9a36e

      SHA512

      56799ed5bc27f21dbd0d448d886345a725bf6a028a31ff781c1e99668445a050c2fe40bdf6efe0e19a2ba6c4d62d93a5aa03ed315f94c44cdadc733db18c33f9

    • C:\Windows\SysWOW64\Njogjfoj.exe

      Filesize

      1.2MB

      MD5

      d1b4020b3e6a1acd1c2f69aeea35f017

      SHA1

      a50ab9c3f84d57e2c01115c437e56bebe17810c1

      SHA256

      c839452c17f433bb8bf0382229c8885951c1608e6a41b5ece8859b418154e18a

      SHA512

      ed5e917d0c84e7ba94e57bfb5ecb92b0643dc9e2994215cde9f911c93ee597a5261d15ffdc67776e82af2dcd6914a9199e0602a9d4655372a7e5b701699a8f0e

    • C:\Windows\SysWOW64\Nkcmohbg.exe

      Filesize

      1.2MB

      MD5

      8fd0a5cd626856c91ead1dd0ff80822a

      SHA1

      264d0fd0465ce40c4e311f47f9be3be8762a89fa

      SHA256

      c0abc5d44c30b1f162ed9fb54b17c71ce9deb75b71688467aaa80ed6feeb3c74

      SHA512

      5dbd6857e096a8a04ba08ba7e666bb81e9ec5ac33b06e7ebe0148245e0f8e223f5aa2a2f1f978ad402c20fd9c2b4ede4a7d6bd123fd3c75ca5583143b010277a

    • C:\Windows\SysWOW64\Nnmopdep.exe

      Filesize

      1.2MB

      MD5

      4d12c370d499356130ec62262f6416a0

      SHA1

      6576c73a6fe6a9bd73ae3547b52208b9f8aecab4

      SHA256

      1ef562ed667897fc9c1b081a662b1816f82d2f62b33459dc7a7d99489bf1ceff

      SHA512

      cab52bc2d7609cff78a7ba0feeadf44509d28f9749e6f5b6a03a1e6cedcb2d2cdf78737f1d0c1fecfe22ea68f7ba4a2f43681f032ef5a9d14c779c69b7180c12

    • C:\Windows\SysWOW64\Nqklmpdd.exe

      Filesize

      1.2MB

      MD5

      ff0e31edf712f50acfd7296c753e8bdb

      SHA1

      d2b7f1569bffa8916afa4c27e5d2ddaa83786a14

      SHA256

      8db60caf0ad128da80da26772264bc48d94f01e78fa689c0b431b32dc45acd81

      SHA512

      9a0a8d34ab3f1252f02b4bebe6c687be68505e693d89f2529b920455e0ff9505035deda3cfb207cb9f71bc78d1e9e0e651de84f8d02fbd72651ed311ea49cb4f

    • C:\Windows\SysWOW64\Nqmhbpba.exe

      Filesize

      1.2MB

      MD5

      8cdd17aa6edaed4918344b8680119a82

      SHA1

      8993d3e2a961afd5e885316286c68acdcdae2c26

      SHA256

      953261df2ec2f51105543eed6cc322e2a17a5b7a03623b977a0a020b8ae05bd3

      SHA512

      5d6bc7037980efe4f26312290d8ce21a4ce1e69f922d1fd60995645a7c8894697842acff0e9860d6e50fef3e077c994d4904845be4f884c398679f716c8b42c0

    • memory/992-80-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/992-89-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1268-16-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1268-98-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1460-100-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1460-0-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1484-32-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1484-97-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1640-95-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1640-48-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2636-94-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2636-39-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2660-99-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2660-8-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2940-55-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/2940-93-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3800-91-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/3800-72-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4520-96-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4520-24-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4732-90-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/4732-87-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5008-64-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/5008-92-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.