Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe
Resource
win10v2004-20220812-en
General
-
Target
c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe
-
Size
323KB
-
MD5
b1d0c2202e24e941a7f617d5acd6df2a
-
SHA1
bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
-
SHA256
c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
-
SHA512
ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3136 oobeldr.exe 1176 oobeldr.exe 4844 oobeldr.exe 2368 oobeldr.exe 4136 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4460 set thread context of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 3136 set thread context of 1176 3136 oobeldr.exe 90 PID 4844 set thread context of 4136 4844 oobeldr.exe 95 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 212 schtasks.exe 5020 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 4460 wrote to memory of 2316 4460 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 79 PID 2316 wrote to memory of 5020 2316 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 82 PID 2316 wrote to memory of 5020 2316 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 82 PID 2316 wrote to memory of 5020 2316 c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe 82 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 3136 wrote to memory of 1176 3136 oobeldr.exe 90 PID 1176 wrote to memory of 212 1176 oobeldr.exe 91 PID 1176 wrote to memory of 212 1176 oobeldr.exe 91 PID 1176 wrote to memory of 212 1176 oobeldr.exe 91 PID 4844 wrote to memory of 2368 4844 oobeldr.exe 94 PID 4844 wrote to memory of 2368 4844 oobeldr.exe 94 PID 4844 wrote to memory of 2368 4844 oobeldr.exe 94 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95 PID 4844 wrote to memory of 4136 4844 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe"C:\Users\Admin\AppData\Local\Temp\c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exeC:\Users\Admin\AppData\Local\Temp\c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:5020
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:212
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2368
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4136
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD503d2df1e8834bc4ec1756735429b458c
SHA14ee6c0f5b04c8e0c5076219c5724032daab11d40
SHA256745ab70552d9a0463b791fd8dc1942838ac3e34fb1a68f09ed3766c7e3b05631
SHA5122482c3d4478125ccbc7f224f50e86b7bf925ed438b59f4dce57b9b6bcdb59df51417049096b131b6b911173550eed98bc92aba7050861de303a692f0681b197b
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70
-
Filesize
323KB
MD5b1d0c2202e24e941a7f617d5acd6df2a
SHA1bddf8cb3b494013744c2b1ddbdc4388ca9bb6414
SHA256c263d2c372289af8d01d92b2a33218c54553acfb0dbc5d9c176e10154b15e5b3
SHA512ddcc8095122b3a4f991ed2b165e0fb4f48c87120521d8c73fc396de42ceb0374e5737b6280e1202b3cbae3865cca01cb91ca77c8c414eac8de6185fd2bcb5e70