Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2022, 01:53
Static task
static1
General
-
Target
cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe
-
Size
1.8MB
-
MD5
b4a029f2769c914cf2128e2c411ab0b8
-
SHA1
1c919fd3ce72e5d69771497fab45e3376c6ae519
-
SHA256
cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556
-
SHA512
4636d031c77dfcf2aeb5b2ff57b6b7fd8253ee92c91632beb7c0ce0e927280d95861e7f3a1806c6a4b9642e57af68cdd50398cd4837add4053f92a59e1a3cb0e
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4936 oobeldr.exe 4936 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5036 schtasks.exe 3216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 4936 oobeldr.exe 4936 oobeldr.exe 4936 oobeldr.exe 4936 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4800 wrote to memory of 5036 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 66 PID 4800 wrote to memory of 5036 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 66 PID 4800 wrote to memory of 5036 4800 cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe 66 PID 4936 wrote to memory of 3216 4936 oobeldr.exe 69 PID 4936 wrote to memory of 3216 4936 oobeldr.exe 69 PID 4936 wrote to memory of 3216 4936 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe"C:\Users\Admin\AppData\Local\Temp\cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5036
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b4a029f2769c914cf2128e2c411ab0b8
SHA11c919fd3ce72e5d69771497fab45e3376c6ae519
SHA256cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556
SHA5124636d031c77dfcf2aeb5b2ff57b6b7fd8253ee92c91632beb7c0ce0e927280d95861e7f3a1806c6a4b9642e57af68cdd50398cd4837add4053f92a59e1a3cb0e
-
Filesize
1.8MB
MD5b4a029f2769c914cf2128e2c411ab0b8
SHA11c919fd3ce72e5d69771497fab45e3376c6ae519
SHA256cf881621990f90ae26e01b8f039c75627d999c48ae9910a26b16f1fcbe410556
SHA5124636d031c77dfcf2aeb5b2ff57b6b7fd8253ee92c91632beb7c0ce0e927280d95861e7f3a1806c6a4b9642e57af68cdd50398cd4837add4053f92a59e1a3cb0e