Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe
Resource
win10-20220901-en
General
-
Target
272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe
-
Size
322KB
-
MD5
cd97897a186099d4875e7007665ba127
-
SHA1
6822cb2fea14561f2985d6a056e9d83073a34192
-
SHA256
272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
-
SHA512
d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4788 oobeldr.exe 4668 oobeldr.exe 884 oobeldr.exe 3564 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1644 set thread context of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 4788 set thread context of 4668 4788 oobeldr.exe 71 PID 884 set thread context of 3564 884 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3648 schtasks.exe 644 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 1644 wrote to memory of 4068 1644 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 67 PID 4068 wrote to memory of 3648 4068 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 68 PID 4068 wrote to memory of 3648 4068 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 68 PID 4068 wrote to memory of 3648 4068 272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe 68 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4788 wrote to memory of 4668 4788 oobeldr.exe 71 PID 4668 wrote to memory of 644 4668 oobeldr.exe 72 PID 4668 wrote to memory of 644 4668 oobeldr.exe 72 PID 4668 wrote to memory of 644 4668 oobeldr.exe 72 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75 PID 884 wrote to memory of 3564 884 oobeldr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe"C:\Users\Admin\AppData\Local\Temp\272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exeC:\Users\Admin\AppData\Local\Temp\272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3648
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:644
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:3564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
322KB
MD5cd97897a186099d4875e7007665ba127
SHA16822cb2fea14561f2985d6a056e9d83073a34192
SHA256272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
SHA512d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358
-
Filesize
322KB
MD5cd97897a186099d4875e7007665ba127
SHA16822cb2fea14561f2985d6a056e9d83073a34192
SHA256272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
SHA512d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358
-
Filesize
322KB
MD5cd97897a186099d4875e7007665ba127
SHA16822cb2fea14561f2985d6a056e9d83073a34192
SHA256272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
SHA512d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358
-
Filesize
322KB
MD5cd97897a186099d4875e7007665ba127
SHA16822cb2fea14561f2985d6a056e9d83073a34192
SHA256272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
SHA512d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358
-
Filesize
322KB
MD5cd97897a186099d4875e7007665ba127
SHA16822cb2fea14561f2985d6a056e9d83073a34192
SHA256272fd6feb2aed68be42ed1d4365c531e908147a649ebc36e2eb0b7a18efd43fa
SHA512d12bf66a00d065d797f1f436894f072837972cf8122206913fe2cf838b0342ecfd062dfbf9fbe66797e5be23fab66f019eca64af5f4519701bea12072b670358