Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
54s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 10:21 UTC
Static task
static1
General
-
Target
572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe
-
Size
1.8MB
-
MD5
3ab8c935f96089e91b70fe4351519646
-
SHA1
a253eec4fc55d554fc8a22effd783653ea96f163
-
SHA256
572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717
-
SHA512
ce464bfec7229ebc753473b506b5c9d3953e7ba4818aada6680f7d3bcf4aa40eee2935b141012c58a2b199b6c6d04dd2d1ead2cd603d36900786a28fe1149a4c
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4320 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 4320 oobeldr.exe 4320 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2168 schtasks.exe 4948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 4320 oobeldr.exe 4320 oobeldr.exe 4320 oobeldr.exe 4320 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2168 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 67 PID 3540 wrote to memory of 2168 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 67 PID 3540 wrote to memory of 2168 3540 572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe 67 PID 4320 wrote to memory of 4948 4320 oobeldr.exe 69 PID 4320 wrote to memory of 4948 4320 oobeldr.exe 69 PID 4320 wrote to memory of 4948 4320 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe"C:\Users\Admin\AppData\Local\Temp\572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2168
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4948
-
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD53ab8c935f96089e91b70fe4351519646
SHA1a253eec4fc55d554fc8a22effd783653ea96f163
SHA256572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717
SHA512ce464bfec7229ebc753473b506b5c9d3953e7ba4818aada6680f7d3bcf4aa40eee2935b141012c58a2b199b6c6d04dd2d1ead2cd603d36900786a28fe1149a4c
-
Filesize
1.8MB
MD53ab8c935f96089e91b70fe4351519646
SHA1a253eec4fc55d554fc8a22effd783653ea96f163
SHA256572635102d0cab3dedbd42245f74a6330beca46440530cc59c2c2de19a642717
SHA512ce464bfec7229ebc753473b506b5c9d3953e7ba4818aada6680f7d3bcf4aa40eee2935b141012c58a2b199b6c6d04dd2d1ead2cd603d36900786a28fe1149a4c