Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 05:44
Static task
static1
General
-
Target
db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe
-
Size
1.8MB
-
MD5
1055cacb496519b2beca1c0f53638ef3
-
SHA1
2c5325ff7b4f6621deb457bd94e732166e9e88cf
-
SHA256
db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894
-
SHA512
2e45543fc62f925137136f1323b5b4b22d4167bf2a839fbc09dd2d554f50fcc01efa3c0aa43ca1e7b364770a671b4d9ec8f3f49dbadc76b8468ac557dd209ca4
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 4772 oobeldr.exe 4772 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe 2440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 4772 oobeldr.exe 4772 oobeldr.exe 4772 oobeldr.exe 4772 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2476 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 82 PID 5012 wrote to memory of 2476 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 82 PID 5012 wrote to memory of 2476 5012 db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe 82 PID 4772 wrote to memory of 2440 4772 oobeldr.exe 94 PID 4772 wrote to memory of 2440 4772 oobeldr.exe 94 PID 4772 wrote to memory of 2440 4772 oobeldr.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe"C:\Users\Admin\AppData\Local\Temp\db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2476
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD51055cacb496519b2beca1c0f53638ef3
SHA12c5325ff7b4f6621deb457bd94e732166e9e88cf
SHA256db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894
SHA5122e45543fc62f925137136f1323b5b4b22d4167bf2a839fbc09dd2d554f50fcc01efa3c0aa43ca1e7b364770a671b4d9ec8f3f49dbadc76b8468ac557dd209ca4
-
Filesize
1.8MB
MD51055cacb496519b2beca1c0f53638ef3
SHA12c5325ff7b4f6621deb457bd94e732166e9e88cf
SHA256db7a7c02c22154620f35881e0f55e936567deaddc98feae2de11443280e1b894
SHA5122e45543fc62f925137136f1323b5b4b22d4167bf2a839fbc09dd2d554f50fcc01efa3c0aa43ca1e7b364770a671b4d9ec8f3f49dbadc76b8468ac557dd209ca4