Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2022, 20:46
Static task
static1
General
-
Target
d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe
-
Size
1.8MB
-
MD5
391558a7785d17f26dc29345caf77c55
-
SHA1
41c61bc96d35e67bb60900ddf46f95794741ccdf
-
SHA256
d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f
-
SHA512
96d3f93b98c36947a8e5a15bc48c2fccac073e4e1510752fcdb624da7f66fdb913c3e160abda1d081dc5f72ea65bb3d57b01bcaa1d35d6c4a34386d65e3fac7a
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2900 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2900 oobeldr.exe 2900 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2148 schtasks.exe 4888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 2900 oobeldr.exe 2900 oobeldr.exe 2900 oobeldr.exe 2900 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2148 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 67 PID 2644 wrote to memory of 2148 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 67 PID 2644 wrote to memory of 2148 2644 d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe 67 PID 2900 wrote to memory of 4888 2900 oobeldr.exe 69 PID 2900 wrote to memory of 4888 2900 oobeldr.exe 69 PID 2900 wrote to memory of 4888 2900 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe"C:\Users\Admin\AppData\Local\Temp\d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2148
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5391558a7785d17f26dc29345caf77c55
SHA141c61bc96d35e67bb60900ddf46f95794741ccdf
SHA256d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f
SHA51296d3f93b98c36947a8e5a15bc48c2fccac073e4e1510752fcdb624da7f66fdb913c3e160abda1d081dc5f72ea65bb3d57b01bcaa1d35d6c4a34386d65e3fac7a
-
Filesize
1.8MB
MD5391558a7785d17f26dc29345caf77c55
SHA141c61bc96d35e67bb60900ddf46f95794741ccdf
SHA256d316a804ad0a69b7cf7ce86e7327c09e078e163fc837455d0f38e64bad7cd71f
SHA51296d3f93b98c36947a8e5a15bc48c2fccac073e4e1510752fcdb624da7f66fdb913c3e160abda1d081dc5f72ea65bb3d57b01bcaa1d35d6c4a34386d65e3fac7a