Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe
Resource
win10-20220812-en
General
-
Target
18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe
-
Size
323KB
-
MD5
1cf0d82fb67319d4e51bc51554687476
-
SHA1
4f36227fb3b6708187da9494f2434fa422dd7acc
-
SHA256
18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
-
SHA512
3562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3568 oobeldr.exe 4420 oobeldr.exe 2900 oobeldr.exe 1216 oobeldr.exe 4972 oobeldr.exe 2544 oobeldr.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2300 set thread context of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 3568 set thread context of 4420 3568 oobeldr.exe 71 PID 2900 set thread context of 1216 2900 oobeldr.exe 75 PID 4972 set thread context of 2544 4972 oobeldr.exe 77 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4648 schtasks.exe 4060 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3628 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 66 PID 2300 wrote to memory of 3628 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 66 PID 2300 wrote to memory of 3628 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 66 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2300 wrote to memory of 2836 2300 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 67 PID 2836 wrote to memory of 4648 2836 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 69 PID 2836 wrote to memory of 4648 2836 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 69 PID 2836 wrote to memory of 4648 2836 18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe 69 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 3568 wrote to memory of 4420 3568 oobeldr.exe 71 PID 4420 wrote to memory of 4060 4420 oobeldr.exe 72 PID 4420 wrote to memory of 4060 4420 oobeldr.exe 72 PID 4420 wrote to memory of 4060 4420 oobeldr.exe 72 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 2900 wrote to memory of 1216 2900 oobeldr.exe 75 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77 PID 4972 wrote to memory of 2544 4972 oobeldr.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe"C:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exeC:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe2⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exeC:\Users\Admin\AppData\Local\Temp\18f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4648
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4060
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1216
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744
-
Filesize
323KB
MD51cf0d82fb67319d4e51bc51554687476
SHA14f36227fb3b6708187da9494f2434fa422dd7acc
SHA25618f8e7ffd4bbdd700381da69b3c54e719692a331ebfa29fc058fe4e35a3fc8a1
SHA5123562a9f33d5760021219db37317ec49eed0ef9041557d25371d39b57df73174f7039b108a81296d171589ae5066b8336440b4b91d1303033cff97fa3ca8e2744