Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe
Resource
win10-20220812-en
General
-
Target
08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe
-
Size
321KB
-
MD5
610ac5fb87f8526be521da509706d492
-
SHA1
d6c118bf8fea30aaffc4b9f7451e6bc6ccaaa1b9
-
SHA256
08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420
-
SHA512
448146303ad8eba34c39abe9c2f66c1a000ac589567e4bea9e90ec679a7b88812156dde36c6037e0bc29ad6095996d485a8fba7f4f9e6c5349fc46185373adc1
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4856 oobeldr.exe 4440 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1788 set thread context of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 4856 set thread context of 4440 4856 oobeldr.exe 70 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe 3904 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 1788 wrote to memory of 4796 1788 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 66 PID 4796 wrote to memory of 2300 4796 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 67 PID 4796 wrote to memory of 2300 4796 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 67 PID 4796 wrote to memory of 2300 4796 08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe 67 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4856 wrote to memory of 4440 4856 oobeldr.exe 70 PID 4440 wrote to memory of 3904 4440 oobeldr.exe 71 PID 4440 wrote to memory of 3904 4440 oobeldr.exe 71 PID 4440 wrote to memory of 3904 4440 oobeldr.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe"C:\Users\Admin\AppData\Local\Temp\08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exeC:\Users\Admin\AppData\Local\Temp\08e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2300
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD5610ac5fb87f8526be521da509706d492
SHA1d6c118bf8fea30aaffc4b9f7451e6bc6ccaaa1b9
SHA25608e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420
SHA512448146303ad8eba34c39abe9c2f66c1a000ac589567e4bea9e90ec679a7b88812156dde36c6037e0bc29ad6095996d485a8fba7f4f9e6c5349fc46185373adc1
-
Filesize
321KB
MD5610ac5fb87f8526be521da509706d492
SHA1d6c118bf8fea30aaffc4b9f7451e6bc6ccaaa1b9
SHA25608e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420
SHA512448146303ad8eba34c39abe9c2f66c1a000ac589567e4bea9e90ec679a7b88812156dde36c6037e0bc29ad6095996d485a8fba7f4f9e6c5349fc46185373adc1
-
Filesize
321KB
MD5610ac5fb87f8526be521da509706d492
SHA1d6c118bf8fea30aaffc4b9f7451e6bc6ccaaa1b9
SHA25608e371324120c25c33f4e51e55891810b9cee3e38a9d88c44224410f33c48420
SHA512448146303ad8eba34c39abe9c2f66c1a000ac589567e4bea9e90ec679a7b88812156dde36c6037e0bc29ad6095996d485a8fba7f4f9e6c5349fc46185373adc1