Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31/10/2022, 19:55

General

  • Target

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04.exe

  • Size

    321KB

  • MD5

    19b81b961d322dae33e6062c727ff37e

  • SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

  • SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

  • SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04.exe
    "C:\Users\Admin\AppData\Local\Temp\eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Local\Temp\eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04.exe
      C:\Users\Admin\AppData\Local\Temp\eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4072
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:3356
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5052
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1088
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

    Filesize

    789B

    MD5

    db5ef8d7c51bad129d9097bf953e4913

    SHA1

    8439db960aa2d431bf5ec3c37af775b45eb07e06

    SHA256

    1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

    SHA512

    04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    321KB

    MD5

    19b81b961d322dae33e6062c727ff37e

    SHA1

    2dc873661323cfe4a699d36010d57b71450c45e3

    SHA256

    eb986f0b0a11d5f889cad02f7196024c93cafb8443f25045fb2edc5c425f6b04

    SHA512

    6ec96257645d07908f5c0bae34c322795bbdd4aa39693864810ba5c8f911b45641f2f52368c9f5d59d62d35afd73b5dcbeeec548ee30670806d708927cab2d62

  • memory/4396-154-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-160-0x0000000007460000-0x00000000074F2000-memory.dmp

    Filesize

    584KB

  • memory/4396-125-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-126-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-127-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-128-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-129-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-130-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-131-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-132-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-133-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-134-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-135-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-136-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-137-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-139-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-138-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-140-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-141-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-142-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-143-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-144-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-145-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-146-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-147-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-148-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-149-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-150-0x0000000000600000-0x0000000000656000-memory.dmp

    Filesize

    344KB

  • memory/4396-151-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-152-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-153-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-123-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-155-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-156-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-157-0x00000000072F0000-0x00000000073BC000-memory.dmp

    Filesize

    816KB

  • memory/4396-158-0x00000000078C0000-0x0000000007DBE000-memory.dmp

    Filesize

    5.0MB

  • memory/4396-159-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-124-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-161-0x00000000073C0000-0x00000000073C6000-memory.dmp

    Filesize

    24KB

  • memory/4396-162-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-163-0x0000000007700000-0x0000000007776000-memory.dmp

    Filesize

    472KB

  • memory/4396-164-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-165-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-166-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-167-0x0000000007410000-0x000000000742E000-memory.dmp

    Filesize

    120KB

  • memory/4396-168-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-169-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-170-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-171-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-172-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-173-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-179-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-116-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-117-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-118-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-119-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-120-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-121-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/4396-122-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-180-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-185-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-182-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-178-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-184-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-183-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-177-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-176-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-174-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5064-186-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-187-0x0000000076FB0000-0x000000007713E000-memory.dmp

    Filesize

    1.6MB

  • memory/5064-228-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB