Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2022, 12:01
Static task
static1
General
-
Target
cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe
-
Size
1.8MB
-
MD5
13a86925540d6af28646e1080ce6185f
-
SHA1
8a683708a06390e00d6574ac918e1f32da80c426
-
SHA256
cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45
-
SHA512
f62071d77f1c20ab86f67b09cfea8da32fd63c1c9f0f04fb21b155112bc8dfc906f34ed1a2644e5b37a8cffbef92375a8e925ac194c2321d09f839f726dfd539
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe -
Executes dropped EXE 1 IoCs
pid Process 3420 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 3420 oobeldr.exe 3420 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe 4124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 3420 oobeldr.exe 3420 oobeldr.exe 3420 oobeldr.exe 3420 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2140 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 66 PID 2676 wrote to memory of 2140 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 66 PID 2676 wrote to memory of 2140 2676 cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe 66 PID 3420 wrote to memory of 4124 3420 oobeldr.exe 69 PID 3420 wrote to memory of 4124 3420 oobeldr.exe 69 PID 3420 wrote to memory of 4124 3420 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe"C:\Users\Admin\AppData\Local\Temp\cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2140
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4124
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD513a86925540d6af28646e1080ce6185f
SHA18a683708a06390e00d6574ac918e1f32da80c426
SHA256cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45
SHA512f62071d77f1c20ab86f67b09cfea8da32fd63c1c9f0f04fb21b155112bc8dfc906f34ed1a2644e5b37a8cffbef92375a8e925ac194c2321d09f839f726dfd539
-
Filesize
1.8MB
MD513a86925540d6af28646e1080ce6185f
SHA18a683708a06390e00d6574ac918e1f32da80c426
SHA256cfa6db5df045db2a07a95157f163e920d408a3103612dc3d29feb27ab2021a45
SHA512f62071d77f1c20ab86f67b09cfea8da32fd63c1c9f0f04fb21b155112bc8dfc906f34ed1a2644e5b37a8cffbef92375a8e925ac194c2321d09f839f726dfd539