Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7storm+noad...89.exe
windows7-x64
7storm+noad...89.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ps.dll
windows7-x64
3$PLUGINSDI...ps.dll
windows10-2004-x64
3$PLUGINSDIR/xml.dll
windows7-x64
3$PLUGINSDIR/xml.dll
windows10-2004-x64
3storm+noad...��.url
windows7-x64
1storm+noad...��.url
windows10-2004-x64
1Analysis
-
max time kernel
140s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 00:00
Behavioral task
behavioral1
Sample
storm+noad+v1.89/Storm NoAD v1.89.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
storm+noad+v1.89/Storm NoAD v1.89.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ToolTips.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/xml.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/xml.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
storm+noad+v1.89/新云软件.url
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
storm+noad+v1.89/新云软件.url
Resource
win10v2004-20240709-en
General
-
Target
storm+noad+v1.89/Storm NoAD v1.89.exe
-
Size
163KB
-
MD5
c68b182ffdb1dcc2b885ce920b568665
-
SHA1
fd4db619b09157d66ad98e0c9c2fa5a783a13737
-
SHA256
0dfb758a17381df8567d2a34e902aa809021ee74ba7fff40aae6ae3e8ebb7c6f
-
SHA512
86e191f3d40065017ef06dd9b6a2d1299769aa439dec8e2e4ce878f8f0b7e1389d76d2b8caa4a998269deaa3f7addedc2c7bbc55f805589fb11f13ef1c0e445f
-
SSDEEP
3072:ZgQWi/OM6UdaqEry9p8VF27JWQ68CGKcE:Zgaj67qErku27JJ63GKcE
Malware Config
Signatures
-
Loads dropped DLL 10 IoCs
pid Process 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral1/memory/2208-309-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 Storm NoAD v1.89.exe 2208 Storm NoAD v1.89.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2208 Storm NoAD v1.89.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 Storm NoAD v1.89.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\storm+noad+v1.89\Storm NoAD v1.89.exe"C:\Users\Admin\AppData\Local\Temp\storm+noad+v1.89\Storm NoAD v1.89.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD599c4f899cdda8565c4d55615cca2ec37
SHA14d54791ef94cd7571cfc5d581bd2f815423b9936
SHA25699727040ccd76ff0da697d57ac60d1b402afc7d65ded78a6a0b459fea0450499
SHA512a41438209bba158864c04293397c061f4f02c09a3ec935c0f1e928545f5a481016a0a919833c56a8b13e9979cf930390bd45fa3116a93c2310d199f2ac6b82d0
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
14KB
MD50dc0cc7a6d9db685bf05a7e5f3ea4781
SHA15d8b6268eeec9d8d904bc9d988a4b588b392213f
SHA2568e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
SHA512814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
4KB
MD59a0da2692764bb842411a8b9687ebbb7
SHA15c3a459faa08a704bdf162476897ad4580ae39bd
SHA25628aeaa48c929188a0d169887cc3f16370741467ae49e1db59763f030710a6bbb
SHA512814d686617df4fe9f50a93dac9428babff3a14836aa27b4666976379ec3fafcab65fd82d8886998fa65e7b59dc192ca067cf8b4cdeb8ef551812912d80dab8ed
-
Filesize
16KB
MD53d2a9eebe3b8d170cd5ddc4baecb4386
SHA14106951885c5d2168c74a192c2818228c2a67462
SHA256491e350cdc0320a6a9cbc1470a5490fe29eec67624da63ea9301d1dc8199b6a1
SHA512819c8a85941eb4b6ab998c0b768a8484c6aad536431dc9d426971c96f2d17e3decee7bd1d5be511cb830f4f2277728b84411d624221b4246d91959ea5d07a649