Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 15:55
Static task
static1
Behavioral task
behavioral1
Sample
e738044641920d634a86955511cd9cea.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e738044641920d634a86955511cd9cea.exe
Resource
win10v2004-20220812-en
General
-
Target
e738044641920d634a86955511cd9cea.exe
-
Size
1.2MB
-
MD5
e738044641920d634a86955511cd9cea
-
SHA1
f4d4ede94dd53f88127ecc32d8f0152055457853
-
SHA256
811175647d86a02c077ef4d92cd468ba080c02948de347c38da71ef212ceaec9
-
SHA512
f52f22ba5676bf51dbba1f5759124ff7c74f95c032bb435908289742ba5d63ff7907acb0e3981928e664a96234972e68714f044e1f5bf638aae377130c3186cd
-
SSDEEP
6144:9Oze8oG6jIB/CTAGax32fXRjddJYoQkNnW:szxoNIB/CwYfXNDJNnW
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4788 oobeldr.exe 916 oobeldr.exe 524 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1800 set thread context of 3476 1800 e738044641920d634a86955511cd9cea.exe 84 PID 4788 set thread context of 916 4788 oobeldr.exe 89 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe 800 schtasks.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1800 e738044641920d634a86955511cd9cea.exe 4788 oobeldr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1800 e738044641920d634a86955511cd9cea.exe 4788 oobeldr.exe 524 oobeldr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3476 1800 e738044641920d634a86955511cd9cea.exe 84 PID 1800 wrote to memory of 3476 1800 e738044641920d634a86955511cd9cea.exe 84 PID 1800 wrote to memory of 3476 1800 e738044641920d634a86955511cd9cea.exe 84 PID 1800 wrote to memory of 3476 1800 e738044641920d634a86955511cd9cea.exe 84 PID 3476 wrote to memory of 4312 3476 e738044641920d634a86955511cd9cea.exe 85 PID 3476 wrote to memory of 4312 3476 e738044641920d634a86955511cd9cea.exe 85 PID 3476 wrote to memory of 4312 3476 e738044641920d634a86955511cd9cea.exe 85 PID 4788 wrote to memory of 916 4788 oobeldr.exe 89 PID 4788 wrote to memory of 916 4788 oobeldr.exe 89 PID 4788 wrote to memory of 916 4788 oobeldr.exe 89 PID 4788 wrote to memory of 916 4788 oobeldr.exe 89 PID 916 wrote to memory of 800 916 oobeldr.exe 90 PID 916 wrote to memory of 800 916 oobeldr.exe 90 PID 916 wrote to memory of 800 916 oobeldr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e738044641920d634a86955511cd9cea.exe"C:\Users\Admin\AppData\Local\Temp\e738044641920d634a86955511cd9cea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\e738044641920d634a86955511cd9cea.exe"C:\Users\Admin\AppData\Local\Temp\e738044641920d634a86955511cd9cea.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4312
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:800
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5e738044641920d634a86955511cd9cea
SHA1f4d4ede94dd53f88127ecc32d8f0152055457853
SHA256811175647d86a02c077ef4d92cd468ba080c02948de347c38da71ef212ceaec9
SHA512f52f22ba5676bf51dbba1f5759124ff7c74f95c032bb435908289742ba5d63ff7907acb0e3981928e664a96234972e68714f044e1f5bf638aae377130c3186cd
-
Filesize
1.2MB
MD5e738044641920d634a86955511cd9cea
SHA1f4d4ede94dd53f88127ecc32d8f0152055457853
SHA256811175647d86a02c077ef4d92cd468ba080c02948de347c38da71ef212ceaec9
SHA512f52f22ba5676bf51dbba1f5759124ff7c74f95c032bb435908289742ba5d63ff7907acb0e3981928e664a96234972e68714f044e1f5bf638aae377130c3186cd
-
Filesize
1.2MB
MD5e738044641920d634a86955511cd9cea
SHA1f4d4ede94dd53f88127ecc32d8f0152055457853
SHA256811175647d86a02c077ef4d92cd468ba080c02948de347c38da71ef212ceaec9
SHA512f52f22ba5676bf51dbba1f5759124ff7c74f95c032bb435908289742ba5d63ff7907acb0e3981928e664a96234972e68714f044e1f5bf638aae377130c3186cd
-
Filesize
1.2MB
MD5e738044641920d634a86955511cd9cea
SHA1f4d4ede94dd53f88127ecc32d8f0152055457853
SHA256811175647d86a02c077ef4d92cd468ba080c02948de347c38da71ef212ceaec9
SHA512f52f22ba5676bf51dbba1f5759124ff7c74f95c032bb435908289742ba5d63ff7907acb0e3981928e664a96234972e68714f044e1f5bf638aae377130c3186cd