Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe
Resource
win10-20220812-en
General
-
Target
ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe
-
Size
327KB
-
MD5
9ccf92a44e22c5bb6940c3d722c35d83
-
SHA1
1a6d612bcfba52bfdccb06fcf4613bb98f0974c1
-
SHA256
ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
-
SHA512
3799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3996 oobeldr.exe 3148 oobeldr.exe 4976 oobeldr.exe 824 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2248 set thread context of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 3996 set thread context of 3148 3996 oobeldr.exe 70 PID 4976 set thread context of 824 4976 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3012 schtasks.exe 4388 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 2248 wrote to memory of 3496 2248 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 66 PID 3496 wrote to memory of 3012 3496 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 67 PID 3496 wrote to memory of 3012 3496 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 67 PID 3496 wrote to memory of 3012 3496 ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe 67 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3996 wrote to memory of 3148 3996 oobeldr.exe 70 PID 3148 wrote to memory of 4388 3148 oobeldr.exe 71 PID 3148 wrote to memory of 4388 3148 oobeldr.exe 71 PID 3148 wrote to memory of 4388 3148 oobeldr.exe 71 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74 PID 4976 wrote to memory of 824 4976 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe"C:\Users\Admin\AppData\Local\Temp\ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exeC:\Users\Admin\AppData\Local\Temp\ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3012
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4388
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
327KB
MD59ccf92a44e22c5bb6940c3d722c35d83
SHA11a6d612bcfba52bfdccb06fcf4613bb98f0974c1
SHA256ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
SHA5123799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1
-
Filesize
327KB
MD59ccf92a44e22c5bb6940c3d722c35d83
SHA11a6d612bcfba52bfdccb06fcf4613bb98f0974c1
SHA256ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
SHA5123799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1
-
Filesize
327KB
MD59ccf92a44e22c5bb6940c3d722c35d83
SHA11a6d612bcfba52bfdccb06fcf4613bb98f0974c1
SHA256ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
SHA5123799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1
-
Filesize
327KB
MD59ccf92a44e22c5bb6940c3d722c35d83
SHA11a6d612bcfba52bfdccb06fcf4613bb98f0974c1
SHA256ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
SHA5123799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1
-
Filesize
327KB
MD59ccf92a44e22c5bb6940c3d722c35d83
SHA11a6d612bcfba52bfdccb06fcf4613bb98f0974c1
SHA256ea93d3f1eb7a87989e444bb5b9af81e9e6a2b59817843eb99cab2bf06d3c388e
SHA5123799a2a5121f986a4a4fcce5b3bf030b6f56bd64a7f51df7eaf622494d5d0a128668ed16ceed08e5387c41368cda4aac7b6281d507b07e4a85ff54224d2025c1