Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe
Resource
win10-20220901-en
General
-
Target
b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe
-
Size
324KB
-
MD5
382640c492c8728dc80438f4ac535892
-
SHA1
f24a126842ea5c2b4d6d807980e382d7ed3b7211
-
SHA256
b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
-
SHA512
166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4844 oobeldr.exe 4656 oobeldr.exe 3784 oobeldr.exe 4476 oobeldr.exe 1916 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 520 set thread context of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 4844 set thread context of 3784 4844 oobeldr.exe 71 PID 4476 set thread context of 1916 4476 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4900 schtasks.exe 4424 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 520 wrote to memory of 3572 520 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 66 PID 3572 wrote to memory of 4900 3572 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 67 PID 3572 wrote to memory of 4900 3572 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 67 PID 3572 wrote to memory of 4900 3572 b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe 67 PID 4844 wrote to memory of 4656 4844 oobeldr.exe 70 PID 4844 wrote to memory of 4656 4844 oobeldr.exe 70 PID 4844 wrote to memory of 4656 4844 oobeldr.exe 70 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 4844 wrote to memory of 3784 4844 oobeldr.exe 71 PID 3784 wrote to memory of 4424 3784 oobeldr.exe 72 PID 3784 wrote to memory of 4424 3784 oobeldr.exe 72 PID 3784 wrote to memory of 4424 3784 oobeldr.exe 72 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75 PID 4476 wrote to memory of 1916 4476 oobeldr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe"C:\Users\Admin\AppData\Local\Temp\b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exeC:\Users\Admin\AppData\Local\Temp\b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4900
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4656
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4424
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d
-
Filesize
324KB
MD5382640c492c8728dc80438f4ac535892
SHA1f24a126842ea5c2b4d6d807980e382d7ed3b7211
SHA256b71c724ab98d8e17e99732a684d7195697d0a6a4ed6447328ef972e4a080d72a
SHA512166bc586fb100e555afe6c0f30a82556eb8bc125db58ba8613f3f603510aac02ae7cc47b8d97dc4f2bb2bd919f1fc60838569493fedc8d030c53e821f731878d