Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2022, 20:50
Static task
static1
General
-
Target
7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe
-
Size
1.8MB
-
MD5
391ecb09cfa56d6188a0821c6c879a6b
-
SHA1
a6f133376cb67a38d7ec1f519c72e8b8d94ef882
-
SHA256
7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e
-
SHA512
8d4ca535b47549d3a4ea4bde5f03de9302b263d862487be571ae3c985a419bec006a90870aa2ca61b81a596355dba1d22c9b1bb8700369183dcbf475854298d5
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 5116 oobeldr.exe 5116 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2180 schtasks.exe 4936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 5116 oobeldr.exe 5116 oobeldr.exe 5116 oobeldr.exe 5116 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2180 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 66 PID 3540 wrote to memory of 2180 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 66 PID 3540 wrote to memory of 2180 3540 7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe 66 PID 5116 wrote to memory of 4936 5116 oobeldr.exe 69 PID 5116 wrote to memory of 4936 5116 oobeldr.exe 69 PID 5116 wrote to memory of 4936 5116 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe"C:\Users\Admin\AppData\Local\Temp\7ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2180
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5391ecb09cfa56d6188a0821c6c879a6b
SHA1a6f133376cb67a38d7ec1f519c72e8b8d94ef882
SHA2567ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e
SHA5128d4ca535b47549d3a4ea4bde5f03de9302b263d862487be571ae3c985a419bec006a90870aa2ca61b81a596355dba1d22c9b1bb8700369183dcbf475854298d5
-
Filesize
1.8MB
MD5391ecb09cfa56d6188a0821c6c879a6b
SHA1a6f133376cb67a38d7ec1f519c72e8b8d94ef882
SHA2567ebfba8ff7f65851d9b99d318dded2a6604a56f27f0abef0cbe74d669e5aa53e
SHA5128d4ca535b47549d3a4ea4bde5f03de9302b263d862487be571ae3c985a419bec006a90870aa2ca61b81a596355dba1d22c9b1bb8700369183dcbf475854298d5