Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 01:58
Static task
static1
General
-
Target
1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe
-
Size
1.8MB
-
MD5
45f99b16f79514e3b4484f0e3f07ba68
-
SHA1
5c195d967f173194c8e323ce9c1e0f2e05ba120b
-
SHA256
1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8
-
SHA512
05a7117bf8d5fb08decb27c37d0014bc678e4979a866bf1f2c06780b4f6ec667e08a7b98151f204bc9545f4183251757a7c6fc6b6f01ad81f890ea8a162d4d69
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 2272 oobeldr.exe 2272 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1684 schtasks.exe 3924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 2272 oobeldr.exe 2272 oobeldr.exe 2272 oobeldr.exe 2272 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3240 wrote to memory of 1684 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 78 PID 3240 wrote to memory of 1684 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 78 PID 3240 wrote to memory of 1684 3240 1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe 78 PID 2272 wrote to memory of 3924 2272 oobeldr.exe 82 PID 2272 wrote to memory of 3924 2272 oobeldr.exe 82 PID 2272 wrote to memory of 3924 2272 oobeldr.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe"C:\Users\Admin\AppData\Local\Temp\1de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD545f99b16f79514e3b4484f0e3f07ba68
SHA15c195d967f173194c8e323ce9c1e0f2e05ba120b
SHA2561de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8
SHA51205a7117bf8d5fb08decb27c37d0014bc678e4979a866bf1f2c06780b4f6ec667e08a7b98151f204bc9545f4183251757a7c6fc6b6f01ad81f890ea8a162d4d69
-
Filesize
1.8MB
MD545f99b16f79514e3b4484f0e3f07ba68
SHA15c195d967f173194c8e323ce9c1e0f2e05ba120b
SHA2561de329957decf1447b33e2d744c36f88fa3a96598c6bf91a711be220cbcfc7a8
SHA51205a7117bf8d5fb08decb27c37d0014bc678e4979a866bf1f2c06780b4f6ec667e08a7b98151f204bc9545f4183251757a7c6fc6b6f01ad81f890ea8a162d4d69