Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 10:58
Static task
static1
General
-
Target
40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe
-
Size
1.8MB
-
MD5
6acbe9b80e18017c49e9e79c5b72256c
-
SHA1
34306e7090d496ad9701889c420e85c5c0adbd8d
-
SHA256
40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb
-
SHA512
0b8da54e56622e3b4c8e2f40daf8da5a3168233b8f3ae8f8f5f8db474fd2cc598e9b944b8e48645015c264e12676b20da94d8ea71c9484cd7e7ff6310d52c9b5
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 2032 oobeldr.exe 2032 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4248 schtasks.exe 4160 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 2032 oobeldr.exe 2032 oobeldr.exe 2032 oobeldr.exe 2032 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4248 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 77 PID 4624 wrote to memory of 4248 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 77 PID 4624 wrote to memory of 4248 4624 40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe 77 PID 2032 wrote to memory of 4160 2032 oobeldr.exe 88 PID 2032 wrote to memory of 4160 2032 oobeldr.exe 88 PID 2032 wrote to memory of 4160 2032 oobeldr.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe"C:\Users\Admin\AppData\Local\Temp\40b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4248
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56acbe9b80e18017c49e9e79c5b72256c
SHA134306e7090d496ad9701889c420e85c5c0adbd8d
SHA25640b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb
SHA5120b8da54e56622e3b4c8e2f40daf8da5a3168233b8f3ae8f8f5f8db474fd2cc598e9b944b8e48645015c264e12676b20da94d8ea71c9484cd7e7ff6310d52c9b5
-
Filesize
1.8MB
MD56acbe9b80e18017c49e9e79c5b72256c
SHA134306e7090d496ad9701889c420e85c5c0adbd8d
SHA25640b09c0b0fc6f1ddb09aa6e5900a03d2d7e87b993ba14a83e7dc168a8ef550cb
SHA5120b8da54e56622e3b4c8e2f40daf8da5a3168233b8f3ae8f8f5f8db474fd2cc598e9b944b8e48645015c264e12676b20da94d8ea71c9484cd7e7ff6310d52c9b5