Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/11/2022, 14:45 UTC

General

  • Target

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba.exe

  • Size

    326KB

  • MD5

    bda3342edec9e4615bbcf9dab9cb99d2

  • SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

  • SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

  • SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba.exe
    "C:\Users\Admin\AppData\Local\Temp\7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba.exe
      C:\Users\Admin\AppData\Local\Temp\7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3472
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:692
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4440
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1456
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1424
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

    Filesize

    789B

    MD5

    db5ef8d7c51bad129d9097bf953e4913

    SHA1

    8439db960aa2d431bf5ec3c37af775b45eb07e06

    SHA256

    1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

    SHA512

    04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    326KB

    MD5

    bda3342edec9e4615bbcf9dab9cb99d2

    SHA1

    01311a103a95d59c2c258cadba24ed7331f6c710

    SHA256

    7addf1994f7f093bdd687c91e6c1cbc1ddd9b7be11cfe149a58efde550c5e7ba

    SHA512

    a9b62cf535586baadc35c3185cd8825c4c64ef32902a49688c2356812e5381b9df254fb44eb2b2e4cd5a22fdb74b5fd4d39c8c45d40f8eb10f8d2d664246975d

  • memory/2060-161-0x0000000008260000-0x000000000875E000-memory.dmp

    Filesize

    5.0MB

  • memory/2060-166-0x0000000008000000-0x0000000008076000-memory.dmp

    Filesize

    472KB

  • memory/2060-131-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-132-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-133-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-134-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-135-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-136-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-137-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-138-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-139-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-140-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-141-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-142-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-143-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-144-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-145-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-146-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-147-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-148-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-149-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-150-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-151-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-152-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-153-0x0000000000EB0000-0x0000000000F06000-memory.dmp

    Filesize

    344KB

  • memory/2060-154-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-155-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-156-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-157-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-159-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-158-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-160-0x0000000007C90000-0x0000000007D5C000-memory.dmp

    Filesize

    816KB

  • memory/2060-119-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-162-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-163-0x0000000007D60000-0x0000000007DF2000-memory.dmp

    Filesize

    584KB

  • memory/2060-164-0x0000000003170000-0x0000000003176000-memory.dmp

    Filesize

    24KB

  • memory/2060-165-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-130-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-167-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-168-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-169-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-170-0x0000000005760000-0x000000000577E000-memory.dmp

    Filesize

    120KB

  • memory/2060-171-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-172-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-173-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-174-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-175-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-176-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-120-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-121-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-122-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-123-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-124-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-125-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-183-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-126-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-127-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-128-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/2060-129-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-185-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-180-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-188-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-187-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-186-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-190-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-189-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-177-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4192-182-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-181-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-231-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/4192-179-0x0000000077480000-0x000000007760E000-memory.dmp

    Filesize

    1.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.