Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
57s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2022, 21:18
Static task
static1
General
-
Target
992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe
-
Size
1.8MB
-
MD5
ce2c1fe24ade457c7d7d11985c6889b6
-
SHA1
0fa33c63770badb58438c3d0963823182b51d2f8
-
SHA256
992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06
-
SHA512
f8f900f6de2b17b51b09992027798d233b1bb470094f923d206023e82d3df7f453a8337ab6bd7b22ca62ff10ca7f89d5cc9493e4720109b9c1d26b2ce0fe7cb3
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1584 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 1584 oobeldr.exe 1584 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4420 schtasks.exe 3500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 1584 oobeldr.exe 1584 oobeldr.exe 1584 oobeldr.exe 1584 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4420 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 66 PID 2796 wrote to memory of 4420 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 66 PID 2796 wrote to memory of 4420 2796 992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe 66 PID 1584 wrote to memory of 3500 1584 oobeldr.exe 69 PID 1584 wrote to memory of 3500 1584 oobeldr.exe 69 PID 1584 wrote to memory of 3500 1584 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe"C:\Users\Admin\AppData\Local\Temp\992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4420
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ce2c1fe24ade457c7d7d11985c6889b6
SHA10fa33c63770badb58438c3d0963823182b51d2f8
SHA256992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06
SHA512f8f900f6de2b17b51b09992027798d233b1bb470094f923d206023e82d3df7f453a8337ab6bd7b22ca62ff10ca7f89d5cc9493e4720109b9c1d26b2ce0fe7cb3
-
Filesize
1.8MB
MD5ce2c1fe24ade457c7d7d11985c6889b6
SHA10fa33c63770badb58438c3d0963823182b51d2f8
SHA256992d0449894c647f39767e99d8929f2ad315afd7bf178b41950c6bd793429f06
SHA512f8f900f6de2b17b51b09992027798d233b1bb470094f923d206023e82d3df7f453a8337ab6bd7b22ca62ff10ca7f89d5cc9493e4720109b9c1d26b2ce0fe7cb3