Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 16:49

General

  • Target

    nooaftbaw.exe

  • Size

    2.7MB

  • MD5

    0f9d70e594f56c8edd2ac19fe3965398

  • SHA1

    0d2d7a59cf1f0f4b3d0169995a5507142fea5973

  • SHA256

    952e8afafcb77c6b6ff3433fef828df1e07865189cd365e417317c8a66fe11c5

  • SHA512

    14dfbcb1b75c6023f9ffb9bdf7dfd29d2fed783b024835ec0d4feb04fcefdb494bea720cb0d3ce6782062d7cd42ddeea64e8f942d8857706a47857c97c3289fe

  • SSDEEP

    49152:KggKji9ggb/R5Xxwic92dOjSnzfirOV6UeMW030/do5iRfi7KRpm8ch/jPycIgSo:mKOWgbbxwD92dkSfiiQc3++iRKuVchjH

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nooaftbaw.exe
    "C:\Users\Admin\AppData\Local\Temp\nooaftbaw.exe"
    1⤵
    • Checks BIOS information in registry
    • Writes to the Master Boot Record (MBR)
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 852
      2⤵
      • Program crash
      PID:5264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 852
      2⤵
      • Program crash
      PID:5308
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:8
    1⤵
      PID:636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5024 -ip 5024
      1⤵
        PID:5224
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=1868 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:1
        1⤵
          PID:5324
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:8
          1⤵
            PID:5468
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=3060 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:1
            1⤵
              PID:5584
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5692 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:1
              1⤵
                PID:5680
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5780 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:1
                1⤵
                  PID:5812
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:8
                  1⤵
                    PID:5896
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5140 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:2
                    1⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5184

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/5024-0-0x00000000026A0000-0x00000000026A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-2-0x0000000002690000-0x0000000002691000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-1-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-4-0x0000000002680000-0x0000000002681000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-5-0x0000000002680000-0x0000000002681000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-6-0x0000000002720000-0x0000000002721000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-8-0x00000000026A0000-0x00000000026A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-9-0x0000000002690000-0x0000000002691000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-10-0x0000000008770000-0x0000000008771000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-11-0x0000000003B50000-0x00000000062C0000-memory.dmp

                    Filesize

                    39.4MB

                  • memory/5024-13-0x0000000000400000-0x00000000008CA000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5024-16-0x0000000000400000-0x00000000008CA000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5024-15-0x0000000000400000-0x00000000008CA000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5024-14-0x0000000002860000-0x0000000002861000-memory.dmp

                    Filesize

                    4KB

                  • memory/5024-17-0x0000000000400000-0x00000000008CA000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/5024-18-0x0000000002860000-0x0000000002861000-memory.dmp

                    Filesize

                    4KB