Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 11:43 UTC
Static task
static1
General
-
Target
4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe
-
Size
1.8MB
-
MD5
347ec0e29a511cb707515978ae3cb052
-
SHA1
d1670765edae138e37f1093335815cac8e4703de
-
SHA256
4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e
-
SHA512
695ce575e85971bb754ea386ad33caee58af5af90ff050f6d6cbb408a007d3d5a5d921cfd29590e7fc5982ffbbfaffefafc5337213ea965d6ca6d52fe85e4272
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3476 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 3476 oobeldr.exe 3476 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 968 schtasks.exe 776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 3476 oobeldr.exe 3476 oobeldr.exe 3476 oobeldr.exe 3476 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2732 wrote to memory of 968 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 66 PID 2732 wrote to memory of 968 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 66 PID 2732 wrote to memory of 968 2732 4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe 66 PID 3476 wrote to memory of 776 3476 oobeldr.exe 69 PID 3476 wrote to memory of 776 3476 oobeldr.exe 69 PID 3476 wrote to memory of 776 3476 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe"C:\Users\Admin\AppData\Local\Temp\4d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:968
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:776
-
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5347ec0e29a511cb707515978ae3cb052
SHA1d1670765edae138e37f1093335815cac8e4703de
SHA2564d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e
SHA512695ce575e85971bb754ea386ad33caee58af5af90ff050f6d6cbb408a007d3d5a5d921cfd29590e7fc5982ffbbfaffefafc5337213ea965d6ca6d52fe85e4272
-
Filesize
1.8MB
MD5347ec0e29a511cb707515978ae3cb052
SHA1d1670765edae138e37f1093335815cac8e4703de
SHA2564d46b9a8b53b3621038c124d3389465f752af09c748607a87b24a33066524d7e
SHA512695ce575e85971bb754ea386ad33caee58af5af90ff050f6d6cbb408a007d3d5a5d921cfd29590e7fc5982ffbbfaffefafc5337213ea965d6ca6d52fe85e4272