Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe
Resource
win10-20220812-en
General
-
Target
775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe
-
Size
325KB
-
MD5
a3b3ac1f2024073844d270206b122fe7
-
SHA1
b066614a63657eed58328a989b7f726afa4323a8
-
SHA256
775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
-
SHA512
6fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 8 oobeldr.exe 3492 oobeldr.exe 4368 oobeldr.exe 4348 oobeldr.exe 4516 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3468 set thread context of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 8 set thread context of 3492 8 oobeldr.exe 71 PID 4368 set thread context of 4348 4368 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4084 schtasks.exe 3652 schtasks.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4836 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 66 PID 3468 wrote to memory of 4836 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 66 PID 3468 wrote to memory of 4836 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 66 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 3468 wrote to memory of 4844 3468 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 67 PID 4844 wrote to memory of 4084 4844 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 68 PID 4844 wrote to memory of 4084 4844 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 68 PID 4844 wrote to memory of 4084 4844 775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe 68 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 8 wrote to memory of 3492 8 oobeldr.exe 71 PID 3492 wrote to memory of 3652 3492 oobeldr.exe 72 PID 3492 wrote to memory of 3652 3492 oobeldr.exe 72 PID 3492 wrote to memory of 3652 3492 oobeldr.exe 72 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4368 wrote to memory of 4348 4368 oobeldr.exe 75 PID 4516 wrote to memory of 2904 4516 oobeldr.exe 77 PID 4516 wrote to memory of 2904 4516 oobeldr.exe 77 PID 4516 wrote to memory of 2904 4516 oobeldr.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe"C:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exeC:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe2⤵PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exeC:\Users\Admin\AppData\Local\Temp\775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4084
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3652
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4348
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3
-
Filesize
325KB
MD5a3b3ac1f2024073844d270206b122fe7
SHA1b066614a63657eed58328a989b7f726afa4323a8
SHA256775a86650ec85d435658e4bee3faa7ed13ad9e5f794ed8b6560f6a3a307a0d2f
SHA5126fd9ce851ca6558964e7d0894514d89f44f83078527c6a5d5c2b87fb4838bef8e0b454bad089d11c7182a7e7168ee645b0feae503da65130ce751409390cf0c3