Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 09:59
Static task
static1
General
-
Target
df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe
-
Size
1.8MB
-
MD5
6a3a5e013acee23b27f39f6cf056c11c
-
SHA1
0eb5539f2ec6c4d0f011f3172dfd25b2a0bca129
-
SHA256
df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb
-
SHA512
cfa14edd6520c6f9333f235a6247860301e5c52bf39cad69e4d8bcafc72897bcafeabb6ce7f5a73f1942ab93ed6c99b353475e5e1c98c78c5e4a19baf47a31f9
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4232 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 4232 oobeldr.exe 4232 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4788 schtasks.exe 4320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 4232 oobeldr.exe 4232 oobeldr.exe 4232 oobeldr.exe 4232 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2688 wrote to memory of 4788 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 66 PID 2688 wrote to memory of 4788 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 66 PID 2688 wrote to memory of 4788 2688 df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe 66 PID 4232 wrote to memory of 4320 4232 oobeldr.exe 69 PID 4232 wrote to memory of 4320 4232 oobeldr.exe 69 PID 4232 wrote to memory of 4320 4232 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe"C:\Users\Admin\AppData\Local\Temp\df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4788
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56a3a5e013acee23b27f39f6cf056c11c
SHA10eb5539f2ec6c4d0f011f3172dfd25b2a0bca129
SHA256df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb
SHA512cfa14edd6520c6f9333f235a6247860301e5c52bf39cad69e4d8bcafc72897bcafeabb6ce7f5a73f1942ab93ed6c99b353475e5e1c98c78c5e4a19baf47a31f9
-
Filesize
1.8MB
MD56a3a5e013acee23b27f39f6cf056c11c
SHA10eb5539f2ec6c4d0f011f3172dfd25b2a0bca129
SHA256df6630ec74f99542b837484497ce87566cf8de15d698c3b0d3ad99ed8d6f70cb
SHA512cfa14edd6520c6f9333f235a6247860301e5c52bf39cad69e4d8bcafc72897bcafeabb6ce7f5a73f1942ab93ed6c99b353475e5e1c98c78c5e4a19baf47a31f9