Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

05/08/2024, 18:20

240805-wyzezaxgnb 7

05/08/2024, 18:18

240805-wx4nasxgle 7

Analysis

  • max time kernel
    32s
  • max time network
    36s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/08/2024, 18:18

General

  • Target

    NoN4m3.exe

  • Size

    77.5MB

  • MD5

    00b049f403d0f68743131eff686e1800

  • SHA1

    a83082c873075ab655f03a0e0d887bac7bf611d6

  • SHA256

    7bcf83c3d41190223b0f55604525eb462c3934dd9346cb7669f6f162e6b1a49d

  • SHA512

    6ba07cc22bbca40cb9594d31b274c8e525c78ec4ad040bbe6ea1e1db65d7b8fd5dfe81549427690f68bb0ea1cb12b3b228ecdd84329203eeaf4afee7b720c0f8

  • SSDEEP

    1572864:/vdF8WWxUUddRzFphBZd5E7Uvs2fib9SrOpsaWMiVqbXWq9onL8uwgI2l+Fzq8:/b85xUUJFprZ87UvAb9Si6aWMyqSJwuu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NoN4m3.exe
    "C:\Users\Admin\AppData\Local\Temp\NoN4m3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\NoN4m3.exe
      "C:\Users\Admin\AppData\Local\Temp\NoN4m3.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:488
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\Qt5\bin\MSVCP140.dll

    Filesize

    443KB

    MD5

    eceff9c92e14b580ea84365f3d60f7de

    SHA1

    00699126456379fa48cb122e21b7f4731a72c57c

    SHA256

    265591a709a5db413d73c95b538da321edeacb40059bdceb142f997a3d458b49

    SHA512

    fd325d77eb2c30e1cd1b2d871986e057318c1be911793521c7bf79fb2c5dc359cb7db90c6d6c5711fedd734b6b03117b8baf241dfbd78585cf55a25983ec8727

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\Qt5\bin\MSVCP140_1.dll

    Filesize

    28KB

    MD5

    7f71f19f30be3942ee0efddc145d459e

    SHA1

    863048cf8a9692bf43317326c5aa918389546282

    SHA256

    b8cafc52b903ed0824882365b0a0d438460260b4ddf2487849eb3bd2241f7e8d

    SHA512

    4fdfbc7524445eb443e189f64d9732c5c28ace689c9556b67c8f3647ba7f18b02521deeae4fb8138f5f550ee34efdb2ab2b6ffea3a43d184a26bdfce700b2dd5

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\Qt5\bin\Qt5Core.dll

    Filesize

    5.1MB

    MD5

    7d180286e9c071c7bc3a6bc2ace792ac

    SHA1

    f5947d69aeaacc8a378721f3750b049cc41dddef

    SHA256

    4f8dc460162407cfccb1be6ef9cce45c4449de838aeffa3fd33378f01a3f9cc4

    SHA512

    9b30d5dd48e736da770e71622b79da294829621565cfc4d995ca31c8cfbbbe2d577677f4240e0ff2d995deeeb5f894018412596c141e8360dd77bf12596ce167

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\Qt5\bin\Qt5Gui.dll

    Filesize

    5.6MB

    MD5

    5b0f3d5b1b29b5e650375093c7afa243

    SHA1

    1920cbc98bd46a3a72bcfb45caefcfa2649a92e6

    SHA256

    80016776efea2b2a838c3ffa4c82e5f146baff68c36073c0c34668809d1c4297

    SHA512

    9db9a90ab5a1a768e079cf9b10f1da868ac7dae774e90e139ee047c9c8fb43cc5b3e01ae3724ea74efd64409eeeafbcda4f04da3e86265575a3831a4fc69cc8c

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\Qt5\bin\Qt5Widgets.dll

    Filesize

    4.3MB

    MD5

    da70580648a398ab1c5336ee9ec631ca

    SHA1

    fa67a8a2d7f7930a45974dcb7a12e56914bf0a57

    SHA256

    600285754e7eee7239b9d252dbed5c9d2c9c4c432751b8953dcb2e8b45e0408a

    SHA512

    83d85df1717a5b1dd5b31f5ab33e73d1442027a719af7fdcd20d578598f436d63e7cf58287cbe34dbee8d5b0464a68dfd471d8ec6a95a3168eb8639864a7adfc

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\QtCore.pyd

    Filesize

    1.9MB

    MD5

    4af547775fbe488501c90e3e38e826c0

    SHA1

    056203a9025112888f6236ce501406017664f6dd

    SHA256

    8ac5f57fc6afa675641d7ddca62b9aac7c85a1f573a01461d2358bb1c8be30f0

    SHA512

    46ce880c5618c7bf8ae9b789bff37fe5abc4840c40b80d0c4d9dd9633bb421d9ba36eaa01ab5d451551ef4693c1025ea6c412d25f640d0a1a119425b544342ea

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\QtGui.pyd

    Filesize

    1.9MB

    MD5

    369c6cbcbf09428b76d5f3f3a20d96e7

    SHA1

    3742c630f6d781b06990efb75eb7cf8d3aed1993

    SHA256

    0406c68f0efba353e7c4e77594272cb156fd6b2dd2706d535342d91e91f58c12

    SHA512

    18d93ca05e4651610dbc10c14759906e9b51adc0b8f244145139517553d46dfc646a195f7e000191b99aa2508fd6a15dbcbe001f258dfe96a6b253f3713fdf31

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\QtWidgets.pyd

    Filesize

    3.8MB

    MD5

    dcd136105e52a5413a1fd8e9ce9a6e41

    SHA1

    28584f1659247926c61812ed70a2c08b487d94be

    SHA256

    3c2878fb74caa02d64a9035e36b331e317d561bee666aa53ed69c88f1f5f2a09

    SHA512

    3a7f5fca769e5b292a56839780747fb104fd0698131ab448751ed4831fb946129977b18e09bbf4e796cfde7090856143f6d60bdeee6a222dc9aef0d4307b2382

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\PyQt5\sip.cp310-win32.pyd

    Filesize

    92KB

    MD5

    607d4c072690976a5c865e0f11dae4c9

    SHA1

    25a4587755756fcfaf25d32e11112c5cc8279455

    SHA256

    fc3b5fc6763011824a1b44d58c5d3d55b7d1dc582d483d08bbbfd522a523abf3

    SHA512

    08b8e5ded80137e2e4d10ca784564dfe5947def48e6c65889a138b98bf13c8b5396e11e9699e744df223a71da2051792b35ab472ffc6ecff1c2378ef8bcd89c0

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\VCRUNTIME140.dll

    Filesize

    74KB

    MD5

    31ce620cb32ac950d31e019e67efc638

    SHA1

    eaf02a203bc11d593a1adb74c246f7a613e8ef09

    SHA256

    1e0f8f7f13502f5cee17232e9bebca7b44dd6ec29f1842bb61033044c65b2bbf

    SHA512

    603e8dceda4cb5b3317020e71f1951d01ace045468eaf118b422f4f44b8b6b2794f5002ea2e3fe9107c222e4cb55b932ed0d897a1871976d75f8ee10d5d12374

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_asyncio.pyd

    Filesize

    50KB

    MD5

    72cded1f02ea183c67cac4d2dd129417

    SHA1

    5d221cb76ac4f7cc85f5da4271ca8607619d3170

    SHA256

    d584831be60125e44bc57704164897880ee0770e44ecc9df6b7f0a68a17d4986

    SHA512

    1a35505e0a1d2c8f1b529bd447f51a1148c14e56ca70b901a75c0e3f449787267460f5819573ff1b84a8729720ee1abdfa5c9daff3a586b99d9af4b85868803c

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_bz2.pyd

    Filesize

    66KB

    MD5

    216f736db1b110548da2f8f21c381412

    SHA1

    da3781dfe8f6b3bdacc92f82c330cc26248b6b5d

    SHA256

    ce4f48bdc1f6144b4bcb288896392867176a2b5f10efbfbc2d5454e14cde61ce

    SHA512

    3bea7426995833f37996468ca3d122c4c182cfcde6f6469d51c211624baa169daacd20101abb1ce8ba50b46fd9f25d1bf1f5e913ebfbea600a5d7ad557f33544

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_ctypes.pyd

    Filesize

    100KB

    MD5

    30e16eeedd78a40498b600312d18161f

    SHA1

    c00f657b13e0b0ab5739abf2ee7b627238cd8055

    SHA256

    92ccf5b99a1f4553001e57fd58bbf8d843b6d6907057e31d236f913f0c51ab82

    SHA512

    76e213afcec7c06d7fe53b674b983773da8e1d32690bf8ba4ad0aa585e7517f36e7a287d9abb108a438c8937fd0c909ed6ce69658556563648cd581f12536707

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_lzma.pyd

    Filesize

    139KB

    MD5

    4a42b4f058c2e58eb3ab47e0166259cc

    SHA1

    4a55098dbffd59c651b862c2e610961b20f3b9da

    SHA256

    adddfd498ed73729af21bc139c421411aa40fa9000da1054c1ed73be6b2c8f56

    SHA512

    dd68e0a20a58c127a91406e7dfbb20f473635974fec15de0e678101241272c70ea7335e3e0cf990bef200d29f73adc519701989992ab55b53894c6d3133df52e

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_overlapped.pyd

    Filesize

    36KB

    MD5

    4a1ac99a32112238eac9720b209d1b0e

    SHA1

    45ebcd122524e9f25671b66e988e0d33f3f0af8b

    SHA256

    c999ef86af630c7bfbcd924b1a19010103c2db19b4dd38df844756b6094f1fd7

    SHA512

    f311173ba7865c3f0629f74767a277b03cf6f029e0acab4f01c5d1820610485dee447a9b7afbffd93ffa77bc36ad8534c160b6c49444bfa743ba5b49f06e9659

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_queue.pyd

    Filesize

    23KB

    MD5

    d105039da54edcabd7b893068c86d1ce

    SHA1

    3ce7b89011ac1311243e1935eeb3a8e49ec8bed8

    SHA256

    214739fe1823ffd6c1d81be15c675743d08b69f73ad2699ff9d193589d8d47f7

    SHA512

    dfcb68e285957ec3f54d7205a59f295eadc495b1d6119591fd850e8c7471cddd4c3367c68f884729486ca1f9352be8f546ea06a988e9f2d2afae9394be46d5d0

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_socket.pyd

    Filesize

    63KB

    MD5

    c7191cfe1da82b09fbedb5ea207397c5

    SHA1

    894199e61d3aa786ce2f5f2e159e8a9d6ffc1f68

    SHA256

    006c61209b77985aae77a8883293be2ac1e3f3913d6d436e16088311135f5bc2

    SHA512

    c6b35f1573fdea5a51b636243f171a2021b93f29092fc46a2c0717cf2f2ce187c77598c203b3c5fa225936e01fc81d957ae684fc9b5b2ecc70bc010ef9a64f38

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_ssl.pyd

    Filesize

    133KB

    MD5

    79595e0f25d0e59d8493f4e6e3c83c64

    SHA1

    7be5783a05a9555dfb634c58453d3422bcac2f78

    SHA256

    4f6f68fa2bc4a974b678737dff7ba97600bcbdda4cdc4cd83261401ffadd846c

    SHA512

    ac1fb03d3cfa7c72b79e0ef13fba72fa9b913e86e7ece2094e3df634a83ee7604b0797d17b3b09c4cee63a63abaab87848df527c9ca399b2d846c286f53c14f3

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\_tkinter.pyd

    Filesize

    50KB

    MD5

    dad0dbcebf13312bee54926c5cb305c2

    SHA1

    24fbb54d9844ee7aef1beb5e3fe8f603bc0ce467

    SHA256

    ef65bb61a19466d459a022541c5a43fafc317955ce3415f61c54202ade197e45

    SHA512

    97167040b0384b8c66fdb03fcb45703392608af9fa8b363ec745855b4a5139ffbeab0e2e7c7f360d4e078bdd06b8d75126262db358504089b320228601fcae09

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\base_library.zip

    Filesize

    1.0MB

    MD5

    4b236197365d3154d097bb2b510a0a00

    SHA1

    8a007723db3429f510487469f753b756612e68e2

    SHA256

    2996094318d240d14d49df2b952fc3d825d3988fbcbccfd0930ac85ffd422850

    SHA512

    de1929b229748284cccfe16581f1b7535fdceab9391c3768b758a56f9aaf689d6427e8821bcab93c175053baf5bd867c2f1179e9b9dba71c6ef0bb7a7727714b

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\libcrypto-1_1.dll

    Filesize

    2.2MB

    MD5

    31c2130f39942ac41f99c77273969cd7

    SHA1

    540edcfcfa75d0769c94877b451f5d0133b1826c

    SHA256

    dd55258272eeb8f2b91a85082887463d0596e992614213730000b2dbc164bcad

    SHA512

    cb4e0b90ea86076bd5c904b46f6389d0fd4afffe0bd3a903c7ff0338c542797063870498e674f86d58764cdbb73b444d1df4b4aa64f69f99b224e86ddaf74bb5

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\libffi-7.dll

    Filesize

    28KB

    MD5

    bc20614744ebf4c2b8acd28d1fe54174

    SHA1

    665c0acc404e13a69800fae94efd69a41bdda901

    SHA256

    0c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57

    SHA512

    0c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\libssl-1_1.dll

    Filesize

    531KB

    MD5

    8471e73a5594c8fbbb3a8b3df4fb7372

    SHA1

    488772cb5bbb50f14a4a9546051edef4ae75dd20

    SHA256

    380bb2c4ce42dd1ef77c33086cf95aa4fe50290a30849a3e77a18900141af793

    SHA512

    24025b8f0cc076a6656eba288f5850847c75f8581c9c3e36273350db475050deee903d034ad130d56d1dede20c0d33b56b567c2ef72eb518f76d887f9254b11b

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\pyexpat.pyd

    Filesize

    159KB

    MD5

    a90cf390c180ad0b5e04fce423a04ce5

    SHA1

    1977e653b274670042a0886f5314ab452e711ddc

    SHA256

    a76b8b926eaf4463cb39147149c0ee0a13ded0afc80cfcf2290edb54d677c7c3

    SHA512

    b5fef5ac63721782453a51cdf01db1ab24124e28be374563da257161241edc7831c532cff287226c1f506ecaacd53b9143a5c1f0e0b9a7a12436e83d72dc15ad

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\python3.DLL

    Filesize

    59KB

    MD5

    b11ef84ff83642891a77cd65eab5a0d9

    SHA1

    d50358e7d95ee237196ea1f3b8be9c172e5d6b6d

    SHA256

    517f661270d576e8c1d51b32d37920dd5d1864438fb3442769f2faa48fd9fb75

    SHA512

    f82adba94d2d8e41779f2c97c0a765d833d0eca75731d9311c473c4c06b7d6dbb9d162c9d87e7c93d2a9388612398c35b6c24675d37d655fb87b88813a6d2f65

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\python310.dll

    Filesize

    3.9MB

    MD5

    87bb8d7f9f22e11d2a3c196ee9bf36a5

    SHA1

    45dfcb22987f5a20a9b32410336c0d097ca91b35

    SHA256

    1269f15b1c8daa25af81e6ad22f9bcebfd2c76aec81c18c6d800460b7105bf98

    SHA512

    75bb2ae36b693e2a1e5ba003503d07ba975f9436fb3da9bf3fc4087a281cb172fa9bd13ad6fc27a62f796af6cbe0c800e2a169c65949a96bd4d0e150f4858288

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\pywin32_system32\pythoncom310.dll

    Filesize

    526KB

    MD5

    d97ecc9f37dc4ed3e5a1927a5b772bef

    SHA1

    23a3869fd403590cd520fa8633e09795e9b5fdcb

    SHA256

    fd2acdf0cab285163604cf342bbdc09b4786415eb68ed4db7625c3e30fd129bb

    SHA512

    5b314ca54b8254f580a4a385a1526504d953e395255a1730073d76add73094ad19d3efe30438aa71869c56a25860b1c743841cd1a3f4ab6f61a98e4cb4a1f5f9

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\pywin32_system32\pywintypes310.dll

    Filesize

    106KB

    MD5

    255c85303581c56bd17a0303ef3bda10

    SHA1

    8519047a3fe52e7952766278964dc44d2b3ad651

    SHA256

    949c0ab7842fb4d9adf01c52c5e24cc286d3f916384684f6c770ec29c69b4d76

    SHA512

    7a4d54b5ee7fd0c33e10d5398ce01b309bd0cea4f5095c11072aa500ba2091b4f5816b7d5abd091d812c985809e99fae7c77eef844294a83d2460cb1744d8ccb

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\select.pyd

    Filesize

    22KB

    MD5

    0b16458372bde0b85e84ce467cfc8c95

    SHA1

    a3ee99f69f0e5ffae36686af479ead1102c2a0a6

    SHA256

    bc9531896aee675fd8ae0fd2805524b5e9ce921dd5365145b9f32141604082db

    SHA512

    727cda4aa085c1af0ce3a9a3a6833057b255678666b2f00dca4f737f322a7cc02cd896ef3353bf9add02faf53b90ce6344e85860cc35da969fcee085c2f210bc

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\tcl86t.dll

    Filesize

    1.4MB

    MD5

    29b698899d592528eab9eaaafb1e4bc5

    SHA1

    2b1651ec9f53f4f2428f259e7f7458947b50a1c4

    SHA256

    f4b05e13908d6f5a397adb48170a9568ec73e55b90a1073be73a5e156f0b3144

    SHA512

    bc56ce9fd678fa7648e467f5f11c079eab5817ccd6cff598ac4e9e13a8db80f9f901b50286343bbe8b90f53a63d594e68b97db1c55e312496d606f265ddd48d6

  • C:\Users\Admin\AppData\Local\Temp\_MEI44762\win32\win32api.pyd

    Filesize

    101KB

    MD5

    ee407dcea96d260b9df5aed85408fe8d

    SHA1

    600a8ccc28069abf6920536ee9d2dbbab449ef5b

    SHA256

    91fa48528506d909c2e40103813789738915ff1318ef20118dc19d17ad017955

    SHA512

    45eacc91681556ac0db64b071b600af84f9cfdb65771529601095b6c1b69ef4b06632298f4b464ea1df5afd1dad91e94977c28c9a752283d6c9a1f224eb3b9e3

  • memory/488-1251-0x0000000073D20000-0x00000000740E8000-memory.dmp

    Filesize

    3.8MB

  • memory/488-1264-0x00000000105A0000-0x00000000105B0000-memory.dmp

    Filesize

    64KB