Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 19:52
Static task
static1
General
-
Target
8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe
-
Size
1.8MB
-
MD5
6e524d4c8901448b3c6481b4b574d97c
-
SHA1
279f91fbe2bc18fb93caa79ce1beb893ed3eb3f7
-
SHA256
8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a
-
SHA512
7731004f0a9e11cf0d12e391fc7c7e2b92edb5dff1a2d724852eac386dee5c8331ed957e250351be50cbba2dbda6aeba20cb0d1390b892bfabcc052041f14cf2
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3496 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 3496 oobeldr.exe 3496 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe 2504 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 3496 oobeldr.exe 3496 oobeldr.exe 3496 oobeldr.exe 3496 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1804 wrote to memory of 3032 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 83 PID 1804 wrote to memory of 3032 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 83 PID 1804 wrote to memory of 3032 1804 8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe 83 PID 3496 wrote to memory of 2504 3496 oobeldr.exe 93 PID 3496 wrote to memory of 2504 3496 oobeldr.exe 93 PID 3496 wrote to memory of 2504 3496 oobeldr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe"C:\Users\Admin\AppData\Local\Temp\8d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3032
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56e524d4c8901448b3c6481b4b574d97c
SHA1279f91fbe2bc18fb93caa79ce1beb893ed3eb3f7
SHA2568d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a
SHA5127731004f0a9e11cf0d12e391fc7c7e2b92edb5dff1a2d724852eac386dee5c8331ed957e250351be50cbba2dbda6aeba20cb0d1390b892bfabcc052041f14cf2
-
Filesize
1.8MB
MD56e524d4c8901448b3c6481b4b574d97c
SHA1279f91fbe2bc18fb93caa79ce1beb893ed3eb3f7
SHA2568d481234b9cb8ea2c2b61d5e8a0a706d1029d0ca2b3887ff3e5af03d27f1963a
SHA5127731004f0a9e11cf0d12e391fc7c7e2b92edb5dff1a2d724852eac386dee5c8331ed957e250351be50cbba2dbda6aeba20cb0d1390b892bfabcc052041f14cf2