Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2024, 19:54 UTC
Behavioral task
behavioral1
Sample
ExumNOVA (1).exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
ExumNOVA (1).exe
-
Size
228KB
-
MD5
f3d936c9efade8ccd0a43ba19ee3ad80
-
SHA1
5aafc1994763497e589203d08c727cdbf481a474
-
SHA256
685aea80db0fd039accee42b17bb7110e3c26529f361dac85f2a6d751982ce89
-
SHA512
b81fa072dc5c0ad1cf08dfcf4d81984d1430f0dbf595d736d0b51249fb302229f116feb908f78e329d0cff5b81b0d517457f4b92c46dcdb0d552a78143c24f55
-
SSDEEP
6144:uloZMzrIkd8g+EtXHkv/iD4Nhi9fVeGJlMFXSy3g2b8e1mWi:4oZcL+EP8Nhi9fVeGJlMFXSy3/o
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral2/memory/3320-0-0x000001EF681E0000-0x000001EF68220000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3320 ExumNOVA (1).exe Token: SeIncreaseQuotaPrivilege 1980 wmic.exe Token: SeSecurityPrivilege 1980 wmic.exe Token: SeTakeOwnershipPrivilege 1980 wmic.exe Token: SeLoadDriverPrivilege 1980 wmic.exe Token: SeSystemProfilePrivilege 1980 wmic.exe Token: SeSystemtimePrivilege 1980 wmic.exe Token: SeProfSingleProcessPrivilege 1980 wmic.exe Token: SeIncBasePriorityPrivilege 1980 wmic.exe Token: SeCreatePagefilePrivilege 1980 wmic.exe Token: SeBackupPrivilege 1980 wmic.exe Token: SeRestorePrivilege 1980 wmic.exe Token: SeShutdownPrivilege 1980 wmic.exe Token: SeDebugPrivilege 1980 wmic.exe Token: SeSystemEnvironmentPrivilege 1980 wmic.exe Token: SeRemoteShutdownPrivilege 1980 wmic.exe Token: SeUndockPrivilege 1980 wmic.exe Token: SeManageVolumePrivilege 1980 wmic.exe Token: 33 1980 wmic.exe Token: 34 1980 wmic.exe Token: 35 1980 wmic.exe Token: 36 1980 wmic.exe Token: SeIncreaseQuotaPrivilege 1980 wmic.exe Token: SeSecurityPrivilege 1980 wmic.exe Token: SeTakeOwnershipPrivilege 1980 wmic.exe Token: SeLoadDriverPrivilege 1980 wmic.exe Token: SeSystemProfilePrivilege 1980 wmic.exe Token: SeSystemtimePrivilege 1980 wmic.exe Token: SeProfSingleProcessPrivilege 1980 wmic.exe Token: SeIncBasePriorityPrivilege 1980 wmic.exe Token: SeCreatePagefilePrivilege 1980 wmic.exe Token: SeBackupPrivilege 1980 wmic.exe Token: SeRestorePrivilege 1980 wmic.exe Token: SeShutdownPrivilege 1980 wmic.exe Token: SeDebugPrivilege 1980 wmic.exe Token: SeSystemEnvironmentPrivilege 1980 wmic.exe Token: SeRemoteShutdownPrivilege 1980 wmic.exe Token: SeUndockPrivilege 1980 wmic.exe Token: SeManageVolumePrivilege 1980 wmic.exe Token: 33 1980 wmic.exe Token: 34 1980 wmic.exe Token: 35 1980 wmic.exe Token: 36 1980 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3320 wrote to memory of 1980 3320 ExumNOVA (1).exe 86 PID 3320 wrote to memory of 1980 3320 ExumNOVA (1).exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExumNOVA (1).exe"C:\Users\Admin\AppData\Local\Temp\ExumNOVA (1).exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
Network
-
Remote address:8.8.8.8:53Requestgstatic.comIN AResponsegstatic.comIN A142.250.200.35
-
Remote address:142.250.200.35:443RequestGET /generate_204 HTTP/1.1
Host: gstatic.com
Connection: Keep-Alive
ResponseHTTP/1.1 204 No Content
Cross-Origin-Resource-Policy: cross-origin
Date: Tue, 06 Feb 2024 19:54:21 GMT
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
-
Remote address:8.8.8.8:53Request183.142.211.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request150.1.37.23.in-addr.arpaIN PTRResponse150.1.37.23.in-addr.arpaIN PTRa23-37-1-150deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.71.91.104.in-addr.arpaIN PTRResponse140.71.91.104.in-addr.arpaIN PTRa104-91-71-140deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request21.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request189.178.17.96.in-addr.arpaIN PTRResponse189.178.17.96.in-addr.arpaIN PTRa96-17-178-189deploystaticakamaitechnologiescom
-
770 B 5.1kB 9 9
HTTP Request
GET https://gstatic.com/generate_204HTTP Response
204
-
57 B 73 B 1 1
DNS Request
gstatic.com
DNS Response
142.250.200.35
-
73 B 159 B 1 1
DNS Request
183.142.211.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
150.1.37.23.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
140.71.91.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
21.236.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
189.178.17.96.in-addr.arpa