Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/11/2022, 02:07 UTC

General

  • Target

    4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe

  • Size

    326KB

  • MD5

    85c55761e1d9ed33a80ef75c2fb710e5

  • SHA1

    3a5e8eff83d7ba063b9157e0f969acab4525909c

  • SHA256

    4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

  • SHA512

    a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe
    "C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe
      C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe
      2⤵
        PID:3908
      • C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe
        C:\Users\Admin\AppData\Local\Temp\4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2836
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3980
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4620
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:756

    Network

      No results found
    • 20.42.65.85:443
      322 B
      7
    No results found

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

      Filesize

      789B

      MD5

      db5ef8d7c51bad129d9097bf953e4913

      SHA1

      8439db960aa2d431bf5ec3c37af775b45eb07e06

      SHA256

      1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

      SHA512

      04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      326KB

      MD5

      85c55761e1d9ed33a80ef75c2fb710e5

      SHA1

      3a5e8eff83d7ba063b9157e0f969acab4525909c

      SHA256

      4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

      SHA512

      a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      326KB

      MD5

      85c55761e1d9ed33a80ef75c2fb710e5

      SHA1

      3a5e8eff83d7ba063b9157e0f969acab4525909c

      SHA256

      4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

      SHA512

      a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      326KB

      MD5

      85c55761e1d9ed33a80ef75c2fb710e5

      SHA1

      3a5e8eff83d7ba063b9157e0f969acab4525909c

      SHA256

      4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

      SHA512

      a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      326KB

      MD5

      85c55761e1d9ed33a80ef75c2fb710e5

      SHA1

      3a5e8eff83d7ba063b9157e0f969acab4525909c

      SHA256

      4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

      SHA512

      a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      326KB

      MD5

      85c55761e1d9ed33a80ef75c2fb710e5

      SHA1

      3a5e8eff83d7ba063b9157e0f969acab4525909c

      SHA256

      4ea1dca8c3fa1539b63e92515f84b3341493ae47906c5b8485ea8f57c1a3062d

      SHA512

      a8d1541387c395bd99bf68f45c968fbc80613e77951497d8c9c42149304178cc92eb287401e59aeb4964567b3e8f48b3f697633f1896a8060417a7072bb29b16

    • memory/3828-152-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-166-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-122-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-123-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-124-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-125-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-126-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-127-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-128-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-129-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-156-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-131-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-132-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-134-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-137-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-139-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-138-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-136-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-135-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-140-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-133-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-141-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-143-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-142-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-145-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-144-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-146-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-147-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-148-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-149-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-151-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-150-0x0000000000430000-0x0000000000486000-memory.dmp

      Filesize

      344KB

    • memory/3828-119-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-153-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-158-0x00000000077F0000-0x0000000007CEE000-memory.dmp

      Filesize

      5.0MB

    • memory/3828-154-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-130-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-121-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-155-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-159-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-160-0x00000000072F0000-0x0000000007382000-memory.dmp

      Filesize

      584KB

    • memory/3828-161-0x0000000000FF0000-0x0000000000FF6000-memory.dmp

      Filesize

      24KB

    • memory/3828-162-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-163-0x0000000007590000-0x0000000007606000-memory.dmp

      Filesize

      472KB

    • memory/3828-164-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-165-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-157-0x0000000007220000-0x00000000072EC000-memory.dmp

      Filesize

      816KB

    • memory/3828-167-0x0000000004F20000-0x0000000004F3E000-memory.dmp

      Filesize

      120KB

    • memory/3828-168-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-170-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-171-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-169-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-172-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-173-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-179-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-116-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-117-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-118-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3828-120-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-187-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-180-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-183-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-184-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-178-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-185-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-186-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-182-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-228-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4128-174-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/4128-177-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    • memory/4128-176-0x0000000077440000-0x00000000775CE000-memory.dmp

      Filesize

      1.6MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.