Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10NovalUPDATED.rar
windows10-ltsc 2021-x64
10NovalUPDAT...ns.txt
windows10-ltsc 2021-x64
1NovalUPDAT...nt.exe
windows10-ltsc 2021-x64
3NovalUPDAT...PD.exe
windows10-ltsc 2021-x64
10NovalUPDAT...er.dll
windows10-ltsc 2021-x64
1NovalUPDAT...re.dll
windows10-ltsc 2021-x64
1NovalUPDAT...cp.dll
windows10-ltsc 2021-x64
1NovalUPDAT...pl.dll
windows10-ltsc 2021-x64
1NovalUPDAT...xt.dll
windows10-ltsc 2021-x64
1NovalUPDAT...ec.dll
windows10-ltsc 2021-x64
1NovalUPDAT...ef.dll
windows10-ltsc 2021-x64
1NovalUPDAT...ec.dll
windows10-ltsc 2021-x64
1NovalUPDAT...ta.dll
windows10-ltsc 2021-x64
1NovalUPDAT...hc.dll
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
94s -
max time network
206s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 22:24
Behavioral task
behavioral1
Sample
NovalUPDATED.rar
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
NovalUPDATED/Noval/Instructions.txt
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral3
Sample
NovalUPDATED/Noval/NovalClient.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
NovalUPDATED/Noval/NovalUPD.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral5
Sample
NovalUPDATED/Noval/bin/WlanRadioManager.dll
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral6
Sample
NovalUPDATED/Noval/bin/d3d10core.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral7
Sample
NovalUPDATED/Noval/bin/l2nacp.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
NovalUPDATED/Noval/bin/libvpl.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral9
Sample
NovalUPDATED/Noval/bin/msauserext.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
NovalUPDATED/Noval/bin/pstorec.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral11
Sample
NovalUPDATED/Noval/bin/wlanpref.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
NovalUPDATED/Noval/bin/wlansec.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral13
Sample
NovalUPDATED/Noval/msdelta.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
NovalUPDATED/Noval/nlahc.dll
Resource
win10ltsc2021-20250217-en
General
-
Target
NovalUPDATED/Noval/NovalClient.exe
-
Size
89KB
-
MD5
193cf6ebb53410e9d283c7fa249cbc27
-
SHA1
de4ce04aaf927f35df0c049c0c7c759aa89de8ea
-
SHA256
efa4393fd460946721a1cfe9e6d65b29248836af9e1eeabef2d3a90fd02f3368
-
SHA512
4a775b43e7a8ba5c6642ccbcf34f68ce1456e8f50e2c8a8e812f825bc6822e70735b4de895f6bdd4ab06bd6b78c797560521f0e7b4551337e1042e8d402bc7ea
-
SSDEEP
1536:n7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfpwYOU:77DhdC6kzWypvaQ0FxyNTBfpF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NovalClient.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4072 2284 NovalClient.exe 81 PID 2284 wrote to memory of 4072 2284 NovalClient.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A112.tmp\A113.tmp\A114.bat C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"2⤵PID:4072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5deafc0c01bad3e97f1edbd3d1e1b1872
SHA13fd54162bc00f745dfbd033d5830dd1a8a8ab662
SHA2562a7024692b56de7f7b1b3b6588704e033e1b9eefc79d75730ebc87142fc67e63
SHA5128c14349e6a18fa6b59a0aedc96f8008f89c3ec93552af196ed78db2d9e66e18108a15704777fdb32cdcad33f4194b65c297d6988014b8aad0b3775a49182c782