Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2022, 08:07
Static task
static1
General
-
Target
ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe
-
Size
1.8MB
-
MD5
16c48b6dc49a4e8d275c549df911b520
-
SHA1
1a56cec1493a8e20c497d04d7e406a8fe8cab9f1
-
SHA256
ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d
-
SHA512
04c3c8a28725dbf747dd9ece995201cbc102b705e78edeecafb7d017c889de2d1f383f3bde1a8f8ccda72a2e19fcb13e8ddb50189ca50b2aec64337611ee3650
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1916 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 1916 oobeldr.exe 1916 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4916 schtasks.exe 2072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 1916 oobeldr.exe 1916 oobeldr.exe 1916 oobeldr.exe 1916 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5012 wrote to memory of 4916 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 84 PID 5012 wrote to memory of 4916 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 84 PID 5012 wrote to memory of 4916 5012 ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe 84 PID 1916 wrote to memory of 2072 1916 oobeldr.exe 95 PID 1916 wrote to memory of 2072 1916 oobeldr.exe 95 PID 1916 wrote to memory of 2072 1916 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe"C:\Users\Admin\AppData\Local\Temp\ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4916
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD516c48b6dc49a4e8d275c549df911b520
SHA11a56cec1493a8e20c497d04d7e406a8fe8cab9f1
SHA256ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d
SHA51204c3c8a28725dbf747dd9ece995201cbc102b705e78edeecafb7d017c889de2d1f383f3bde1a8f8ccda72a2e19fcb13e8ddb50189ca50b2aec64337611ee3650
-
Filesize
1.8MB
MD516c48b6dc49a4e8d275c549df911b520
SHA11a56cec1493a8e20c497d04d7e406a8fe8cab9f1
SHA256ab5d945f0df0849eb41dbde76e3bc7e87f7fed10b0a5bbfa39f6973e6340a79d
SHA51204c3c8a28725dbf747dd9ece995201cbc102b705e78edeecafb7d017c889de2d1f383f3bde1a8f8ccda72a2e19fcb13e8ddb50189ca50b2aec64337611ee3650