Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe
Resource
win10v2004-20220812-en
General
-
Target
1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe
-
Size
323KB
-
MD5
7f4d19c89430765e058a454b0f29c8bd
-
SHA1
c0986505f03c4498c8eb0fd92c42d353b6b53d60
-
SHA256
1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
-
SHA512
3efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1300 oobeldr.exe 2456 oobeldr.exe 116 oobeldr.exe 4928 oobeldr.exe 4728 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1404 set thread context of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1300 set thread context of 116 1300 oobeldr.exe 91 PID 4928 set thread context of 4728 4928 oobeldr.exe 95 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 368 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1404 wrote to memory of 1208 1404 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 79 PID 1208 wrote to memory of 4628 1208 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 80 PID 1208 wrote to memory of 4628 1208 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 80 PID 1208 wrote to memory of 4628 1208 1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe 80 PID 1300 wrote to memory of 2456 1300 oobeldr.exe 90 PID 1300 wrote to memory of 2456 1300 oobeldr.exe 90 PID 1300 wrote to memory of 2456 1300 oobeldr.exe 90 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 1300 wrote to memory of 116 1300 oobeldr.exe 91 PID 116 wrote to memory of 368 116 oobeldr.exe 92 PID 116 wrote to memory of 368 116 oobeldr.exe 92 PID 116 wrote to memory of 368 116 oobeldr.exe 92 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95 PID 4928 wrote to memory of 4728 4928 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe"C:\Users\Admin\AppData\Local\Temp\1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exeC:\Users\Admin\AppData\Local\Temp\1e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4628
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:368
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4728
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD503d2df1e8834bc4ec1756735429b458c
SHA14ee6c0f5b04c8e0c5076219c5724032daab11d40
SHA256745ab70552d9a0463b791fd8dc1942838ac3e34fb1a68f09ed3766c7e3b05631
SHA5122482c3d4478125ccbc7f224f50e86b7bf925ed438b59f4dce57b9b6bcdb59df51417049096b131b6b911173550eed98bc92aba7050861de303a692f0681b197b
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6
-
Filesize
323KB
MD57f4d19c89430765e058a454b0f29c8bd
SHA1c0986505f03c4498c8eb0fd92c42d353b6b53d60
SHA2561e190e32c32a7d9818ae98f04150d14412cba32ac573427eb1d2d5d5a4ac5114
SHA5123efbde0a25bc9a6c687b597714c1a02e0a98a49446df45a549603b1bb585758a8a311d21d2c87cf33b90382d3aaa17860c0083889f297e4dd5f1d59a3c9646f6