Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/09/2022, 13:09
Static task
static1
General
-
Target
8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe
-
Size
1.8MB
-
MD5
c3ca32fc25488ea1653c345708e998b6
-
SHA1
a751c9ead40309f97b1232b55247074905ec20e3
-
SHA256
8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427
-
SHA512
d4a7038935128f447076da6bf6b964261c8f1a4ca3920f9a8ef291b467ef956918d7226047de55da981fa08233ddefa943ef34b1365094e909f538dfe92d8384
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4572 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 4572 oobeldr.exe 4572 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5068 schtasks.exe 3996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 4572 oobeldr.exe 4572 oobeldr.exe 4572 oobeldr.exe 4572 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3040 wrote to memory of 5068 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 66 PID 3040 wrote to memory of 5068 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 66 PID 3040 wrote to memory of 5068 3040 8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe 66 PID 4572 wrote to memory of 3996 4572 oobeldr.exe 69 PID 4572 wrote to memory of 3996 4572 oobeldr.exe 69 PID 4572 wrote to memory of 3996 4572 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe"C:\Users\Admin\AppData\Local\Temp\8a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5c3ca32fc25488ea1653c345708e998b6
SHA1a751c9ead40309f97b1232b55247074905ec20e3
SHA2568a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427
SHA512d4a7038935128f447076da6bf6b964261c8f1a4ca3920f9a8ef291b467ef956918d7226047de55da981fa08233ddefa943ef34b1365094e909f538dfe92d8384
-
Filesize
1.8MB
MD5c3ca32fc25488ea1653c345708e998b6
SHA1a751c9ead40309f97b1232b55247074905ec20e3
SHA2568a831ed1c7b672476c46e89d3c7e5a4757f6baccab668a9298b1461b85e0c427
SHA512d4a7038935128f447076da6bf6b964261c8f1a4ca3920f9a8ef291b467ef956918d7226047de55da981fa08233ddefa943ef34b1365094e909f538dfe92d8384