Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2023, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
nooaftbaw.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
nooaftbaw.exe
Resource
win10v2004-20230915-en
General
-
Target
nooaftbaw.exe
-
Size
2.7MB
-
MD5
0f9d70e594f56c8edd2ac19fe3965398
-
SHA1
0d2d7a59cf1f0f4b3d0169995a5507142fea5973
-
SHA256
952e8afafcb77c6b6ff3433fef828df1e07865189cd365e417317c8a66fe11c5
-
SHA512
14dfbcb1b75c6023f9ffb9bdf7dfd29d2fed783b024835ec0d4feb04fcefdb494bea720cb0d3ce6782062d7cd42ddeea64e8f942d8857706a47857c97c3289fe
-
SSDEEP
49152:KggKji9ggb/R5Xxwic92dOjSnzfirOV6UeMW030/do5iRfi7KRpm8ch/jPycIgSo:mKOWgbbxwD92dkSfiiQc3++iRKuVchjH
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nooaftbaw.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 nooaftbaw.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5264 5024 WerFault.exe 101 5308 5024 WerFault.exe 101 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nooaftbaw.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosDate nooaftbaw.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Bios nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct nooaftbaw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor nooaftbaw.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5024 nooaftbaw.exe 5184 chrome.exe 5184 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5024 nooaftbaw.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 5264 5024 nooaftbaw.exe 113 PID 5024 wrote to memory of 5264 5024 nooaftbaw.exe 113 PID 5024 wrote to memory of 5264 5024 nooaftbaw.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\nooaftbaw.exe"C:\Users\Admin\AppData\Local\Temp\nooaftbaw.exe"1⤵
- Checks BIOS information in registry
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 8522⤵
- Program crash
PID:5264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 8522⤵
- Program crash
PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:81⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5024 -ip 50241⤵PID:5224
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=1868 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:11⤵PID:5324
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3200 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:81⤵PID:5468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --mojo-platform-channel-handle=3060 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:11⤵PID:5584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --mojo-platform-channel-handle=5692 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:11⤵PID:5680
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5780 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:11⤵PID:5812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:81⤵PID:5896
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5140 --field-trial-handle=1888,i,2844173356128519326,1903920000667539854,131072 /prefetch:21⤵
- Suspicious behavior: EnumeratesProcesses
PID:5184