Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10NovalUPDAT...nt.exe
windows7-x64
3NovalUPDAT...nt.exe
windows10-2004-x64
3NovalUPDAT...PD.exe
windows7-x64
10NovalUPDAT...PD.exe
windows10-2004-x64
10NovalUPDAT...er.dll
windows10-2004-x64
1NovalUPDAT...re.dll
windows10-2004-x64
1NovalUPDAT...cp.dll
windows10-2004-x64
1NovalUPDAT...pl.dll
windows7-x64
1NovalUPDAT...pl.dll
windows10-2004-x64
1NovalUPDAT...xt.dll
windows10-2004-x64
1NovalUPDAT...ec.dll
windows10-2004-x64
1NovalUPDAT...ef.dll
windows10-2004-x64
1NovalUPDAT...ec.dll
windows10-2004-x64
1NovalUPDAT...ta.dll
windows10-2004-x64
1NovalUPDAT...hc.dll
windows10-2004-x64
1Analysis
-
max time kernel
64s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 22:31
Behavioral task
behavioral1
Sample
NovalUPDATED/Noval/NovalClient.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
NovalUPDATED/Noval/NovalClient.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
NovalUPDATED/Noval/NovalUPD.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NovalUPDATED/Noval/NovalUPD.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
NovalUPDATED/Noval/bin/WlanRadioManager.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
NovalUPDATED/Noval/bin/d3d10core.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
NovalUPDATED/Noval/bin/l2nacp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
NovalUPDATED/Noval/bin/libvpl.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
NovalUPDATED/Noval/bin/libvpl.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
NovalUPDATED/Noval/bin/msauserext.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
NovalUPDATED/Noval/bin/pstorec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
NovalUPDATED/Noval/bin/wlanpref.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
NovalUPDATED/Noval/bin/wlansec.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
NovalUPDATED/Noval/msdelta.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
NovalUPDATED/Noval/nlahc.dll
Resource
win10v2004-20250217-en
General
-
Target
NovalUPDATED/Noval/NovalClient.exe
-
Size
89KB
-
MD5
193cf6ebb53410e9d283c7fa249cbc27
-
SHA1
de4ce04aaf927f35df0c049c0c7c759aa89de8ea
-
SHA256
efa4393fd460946721a1cfe9e6d65b29248836af9e1eeabef2d3a90fd02f3368
-
SHA512
4a775b43e7a8ba5c6642ccbcf34f68ce1456e8f50e2c8a8e812f825bc6822e70735b4de895f6bdd4ab06bd6b78c797560521f0e7b4551337e1042e8d402bc7ea
-
SSDEEP
1536:n7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfpwYOU:77DhdC6kzWypvaQ0FxyNTBfpF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NovalClient.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2936 2792 NovalClient.exe 31 PID 2792 wrote to memory of 2936 2792 NovalClient.exe 31 PID 2792 wrote to memory of 2936 2792 NovalClient.exe 31 PID 2792 wrote to memory of 2936 2792 NovalClient.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\645E.tmp\645F.tmp\6460.bat C:\Users\Admin\AppData\Local\Temp\NovalUPDATED\Noval\NovalClient.exe"2⤵PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22B
MD5deafc0c01bad3e97f1edbd3d1e1b1872
SHA13fd54162bc00f745dfbd033d5830dd1a8a8ab662
SHA2562a7024692b56de7f7b1b3b6588704e033e1b9eefc79d75730ebc87142fc67e63
SHA5128c14349e6a18fa6b59a0aedc96f8008f89c3ec93552af196ed78db2d9e66e18108a15704777fdb32cdcad33f4194b65c297d6988014b8aad0b3775a49182c782