Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 18:35
Behavioral task
behavioral1
Sample
Nuwo.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Nuwo.exe
Resource
win10v2004-20240426-en
General
-
Target
Nuwo.exe
-
Size
5.6MB
-
MD5
013ea4a21aaca3ed7996813e64aa7bba
-
SHA1
d0014c7dee9b7ebd81ffc393dd959108763d8d10
-
SHA256
5cef45602b843003d06ee762499e1606134be8ce6567e046961863cbc96e9c72
-
SHA512
1244bb7d70665279419cd9b1a74beafab30a6cc84740248c00dec4c19d58148324e83df594f70f1818fa2edb1afa6acbc42155bb4ea860c56de9a0084d483b71
-
SSDEEP
98304:untKXczyJxK1GHWjOjFgFXHYSxTpirSHcUR4iRr2ZF9yoeb3/2JlI9P5QQR:untO7K1MkOjmFXRxtYSHdKiRr2RN8yOX
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2556 Nuwo.exe 2556 Nuwo.exe 2556 Nuwo.exe 2556 Nuwo.exe 2556 Nuwo.exe 2556 Nuwo.exe 2556 Nuwo.exe -
resource yara_rule behavioral1/files/0x0005000000019433-80.dat upx behavioral1/memory/2556-82-0x000007FEF5E50000-0x000007FEF62B6000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2556 2032 Nuwo.exe 29 PID 2032 wrote to memory of 2556 2032 Nuwo.exe 29 PID 2032 wrote to memory of 2556 2032 Nuwo.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5309ff152e830995a7978da8b20ebb318
SHA17daaf752d511b0fdae74008a5d0808f51553f21e
SHA256940a9a02e564e2ce13280b78f4aa7b794b97685830edf2be3fbb0aecfdee707d
SHA512565ea894214b88ea1a50779a1f36db2cbeb0aaf77a24d92b3d66c1ddab2dc57876205aa02721f79d3d4d01012df7347b62f4b8504f65915e07170b6901a7679c
-
Filesize
13KB
MD51e10f8ae883cdf8fc5fe166e61bd4c45
SHA15bc3de1f03674a32b309869a5f1b48d89790ff40
SHA256e9e0a414c092ac237ee2c0e5f167efe9ff5e62314a5eb529011f85bdf7c0b2b7
SHA5122ab555986a57f7fda8e284d472d1c1ca583e2415b6e9deccb0f1b0c72ce81fcddb1c733dc0b8f9d0f3ab8eae21864080c9091202ff99655534019b28a3ea866a
-
Filesize
15KB
MD5d13d82a9f3a0ee74f5c778ea50de9d4b
SHA1afbf2470f0d46caf56f792ee10f6e86d58fc1aef
SHA256139594138f923f34192b84edd810a6292eeb880e7797aeb3b9f22e69613426cf
SHA5128544c73b9fb957ce0af9c112e0e06f3548525995d242098bf54c6d9e1a9822b1687bb5c32f85a7496632bfcabd4982ad8d573d74e1dc500c51cbd51558f8d6ba
-
Filesize
13KB
MD5e105a7a95c3446b76a521c741ab03d1b
SHA1b8371e3d938daca45bfd7ef2101e6fabd0e2450d
SHA256a2947ba9d0c5510a62f685c839990cbe4ec43e2c7b38e20938420b562229090f
SHA51210d4ed9e7a47d21bf04bb6c3b181e66528755601b1b748d2c23c20c9543f18e2cc2e87e133db5569b19d04748356891159ba210c1e3e719bb6dafce054a7c55a
-
Filesize
13KB
MD5e27aa1ee2a6b5aa8d746ceed7095fdaf
SHA1e7bc272932c30c494e672bc2871bbc26d2c758b6
SHA25631e96eaf08a5dad4afe4304c97d18aefdfdc22c444c9f67be272f8e6282aa76a
SHA5124c075c2ebab277480a05108588155d6f669c32d0bffd4264bc4d316fbaee613f940ffe4432ff906346f4290c5e379c7449a989c932834aed4c3f972d905b59e1
-
Filesize
1.4MB
MD508812511e94ad9859492a8d19cafa63e
SHA1492b9fefb9cc5c7f80681ebfa373d48b3a600747
SHA2569742af9d1154293fa4c4fc50352430c22d56e8cdc99202c78533af182d96489c
SHA5126f7e41f4e2f893841329ac62315809a59a8d01ca047cb5739eb7ac1294afd4de2754549f7b1f5f9affa3397e9de379c5f6396844fc4fab9328362566225ddb8e
-
Filesize
987KB
MD528647d8fb402416cb1c986894d849c50
SHA1bf0eaa587001214a4d6e6876b8adfcb49254450b
SHA256b3591e2ba725934a1a659882444b85b186da44d2dddaba3b66587dd3f97364ab
SHA512689346b9d9fa2f93a5d50af15eee9cc18ee819c00986dabbdd102126556466adecc412a8c539a8d22239cddccc1c3d3dd5783dff047f593bfd7be761c0ab9b12