Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
113s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe
Resource
win10-20220812-en
General
-
Target
6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe
-
Size
321KB
-
MD5
0f33607242e5422f78a906b75c583089
-
SHA1
e775f0f419e3a01e56d75940bc88b868b3a40c69
-
SHA256
6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1
-
SHA512
9e71d451bb467d5fc1ef7b9bd26a6cda5a9eaa2991e6f56c42396cedf0a20e4cc22e8a281286dbefe28c76ca6b69688ad8092beaa52ee423c9d9391f6715a562
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1588 oobeldr.exe 2564 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2368 set thread context of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 1588 set thread context of 2564 1588 oobeldr.exe 70 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3324 schtasks.exe 3024 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 2368 wrote to memory of 3588 2368 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 66 PID 3588 wrote to memory of 3324 3588 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 67 PID 3588 wrote to memory of 3324 3588 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 67 PID 3588 wrote to memory of 3324 3588 6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe 67 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 1588 wrote to memory of 2564 1588 oobeldr.exe 70 PID 2564 wrote to memory of 3024 2564 oobeldr.exe 71 PID 2564 wrote to memory of 3024 2564 oobeldr.exe 71 PID 2564 wrote to memory of 3024 2564 oobeldr.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe"C:\Users\Admin\AppData\Local\Temp\6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exeC:\Users\Admin\AppData\Local\Temp\6d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3324
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3024
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD50f33607242e5422f78a906b75c583089
SHA1e775f0f419e3a01e56d75940bc88b868b3a40c69
SHA2566d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1
SHA5129e71d451bb467d5fc1ef7b9bd26a6cda5a9eaa2991e6f56c42396cedf0a20e4cc22e8a281286dbefe28c76ca6b69688ad8092beaa52ee423c9d9391f6715a562
-
Filesize
321KB
MD50f33607242e5422f78a906b75c583089
SHA1e775f0f419e3a01e56d75940bc88b868b3a40c69
SHA2566d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1
SHA5129e71d451bb467d5fc1ef7b9bd26a6cda5a9eaa2991e6f56c42396cedf0a20e4cc22e8a281286dbefe28c76ca6b69688ad8092beaa52ee423c9d9391f6715a562
-
Filesize
321KB
MD50f33607242e5422f78a906b75c583089
SHA1e775f0f419e3a01e56d75940bc88b868b3a40c69
SHA2566d08f20e0b4b40a767408a93477e824ef604e1616954c182eca7092f2cc361e1
SHA5129e71d451bb467d5fc1ef7b9bd26a6cda5a9eaa2991e6f56c42396cedf0a20e4cc22e8a281286dbefe28c76ca6b69688ad8092beaa52ee423c9d9391f6715a562