Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 10:03
Static task
static1
General
-
Target
65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe
-
Size
1.8MB
-
MD5
06e1b3513cb994ad98d849e8c8cb715e
-
SHA1
c38bb19788030bdf1355a3a1bebcceaf9e57135e
-
SHA256
65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1
-
SHA512
746897321625c1e322c18959d00d226a01195815af4bee0943e6c8ab63348f3aa9fd05637f0917a72cbd7a5a7dd91d115cbf075d87450b74b145d70a1a5c941c
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 5104 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 5104 oobeldr.exe 5104 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4784 schtasks.exe 4892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 5104 oobeldr.exe 5104 oobeldr.exe 5104 oobeldr.exe 5104 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2404 wrote to memory of 4784 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 66 PID 2404 wrote to memory of 4784 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 66 PID 2404 wrote to memory of 4784 2404 65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe 66 PID 5104 wrote to memory of 4892 5104 oobeldr.exe 69 PID 5104 wrote to memory of 4892 5104 oobeldr.exe 69 PID 5104 wrote to memory of 4892 5104 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe"C:\Users\Admin\AppData\Local\Temp\65d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4784
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4892
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD506e1b3513cb994ad98d849e8c8cb715e
SHA1c38bb19788030bdf1355a3a1bebcceaf9e57135e
SHA25665d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1
SHA512746897321625c1e322c18959d00d226a01195815af4bee0943e6c8ab63348f3aa9fd05637f0917a72cbd7a5a7dd91d115cbf075d87450b74b145d70a1a5c941c
-
Filesize
1.8MB
MD506e1b3513cb994ad98d849e8c8cb715e
SHA1c38bb19788030bdf1355a3a1bebcceaf9e57135e
SHA25665d77aa0e0f9f43a9a367972582424b920917938e69404ce7403e52cb3398cc1
SHA512746897321625c1e322c18959d00d226a01195815af4bee0943e6c8ab63348f3aa9fd05637f0917a72cbd7a5a7dd91d115cbf075d87450b74b145d70a1a5c941c