Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2022, 21:37
Static task
static1
General
-
Target
6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe
-
Size
1.8MB
-
MD5
5fab6ef6bad8849edb6a3e92dc84e4b4
-
SHA1
e2ef66e264b9b02f062a7558aef572b73a958f6e
-
SHA256
6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c
-
SHA512
c6eb065055222effec8333664ee5a67a52961d713b664aa1dd4348cc6d26e8a084b770d2c32ce27a0836a2855fcf41da4d65324b79155c628d74b569e310ff4f
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1236 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 1236 oobeldr.exe 1236 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1960 schtasks.exe 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 1236 oobeldr.exe 1236 oobeldr.exe 1236 oobeldr.exe 1236 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1096 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 85 PID 2332 wrote to memory of 1096 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 85 PID 2332 wrote to memory of 1096 2332 6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe 85 PID 1236 wrote to memory of 1960 1236 oobeldr.exe 93 PID 1236 wrote to memory of 1960 1236 oobeldr.exe 93 PID 1236 wrote to memory of 1960 1236 oobeldr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe"C:\Users\Admin\AppData\Local\Temp\6230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1096
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55fab6ef6bad8849edb6a3e92dc84e4b4
SHA1e2ef66e264b9b02f062a7558aef572b73a958f6e
SHA2566230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c
SHA512c6eb065055222effec8333664ee5a67a52961d713b664aa1dd4348cc6d26e8a084b770d2c32ce27a0836a2855fcf41da4d65324b79155c628d74b569e310ff4f
-
Filesize
1.8MB
MD55fab6ef6bad8849edb6a3e92dc84e4b4
SHA1e2ef66e264b9b02f062a7558aef572b73a958f6e
SHA2566230ea90a0e229223796cc79715e39c3fa29e6be888b1ded9144780be61c8e5c
SHA512c6eb065055222effec8333664ee5a67a52961d713b664aa1dd4348cc6d26e8a084b770d2c32ce27a0836a2855fcf41da4d65324b79155c628d74b569e310ff4f