Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
261s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
02/09/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe
Resource
win10-20230703-en
General
-
Target
ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe
-
Size
322KB
-
MD5
756b0643cc3bc903185f3e6e9d0088bd
-
SHA1
cb762343b744668aeede87e83517b2b2ad67f6d4
-
SHA256
ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122
-
SHA512
02b5a619ee09efcff9976e94b88452b777db7240e5ed7cc9b3c804f2d17d5797137769d8f1b0ebe840508418144dd9a939b6cf9198e3d357e11097f5f72ed57c
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3760 oobeldr.exe 2716 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1660 set thread context of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 3760 set thread context of 2716 3760 oobeldr.exe 73 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3044 schtasks.exe 4932 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 1660 wrote to memory of 4976 1660 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 69 PID 4976 wrote to memory of 3044 4976 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 70 PID 4976 wrote to memory of 3044 4976 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 70 PID 4976 wrote to memory of 3044 4976 ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe 70 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 3760 wrote to memory of 2716 3760 oobeldr.exe 73 PID 2716 wrote to memory of 4932 2716 oobeldr.exe 74 PID 2716 wrote to memory of 4932 2716 oobeldr.exe 74 PID 2716 wrote to memory of 4932 2716 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe"C:\Users\Admin\AppData\Local\Temp\ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exeC:\Users\Admin\AppData\Local\Temp\ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3044
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5756b0643cc3bc903185f3e6e9d0088bd
SHA1cb762343b744668aeede87e83517b2b2ad67f6d4
SHA256ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122
SHA51202b5a619ee09efcff9976e94b88452b777db7240e5ed7cc9b3c804f2d17d5797137769d8f1b0ebe840508418144dd9a939b6cf9198e3d357e11097f5f72ed57c
-
Filesize
322KB
MD5756b0643cc3bc903185f3e6e9d0088bd
SHA1cb762343b744668aeede87e83517b2b2ad67f6d4
SHA256ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122
SHA51202b5a619ee09efcff9976e94b88452b777db7240e5ed7cc9b3c804f2d17d5797137769d8f1b0ebe840508418144dd9a939b6cf9198e3d357e11097f5f72ed57c
-
Filesize
322KB
MD5756b0643cc3bc903185f3e6e9d0088bd
SHA1cb762343b744668aeede87e83517b2b2ad67f6d4
SHA256ebc7a922a9207a481faf455e4261feff9e86b1eecb37c27d8f471b82c85ec122
SHA51202b5a619ee09efcff9976e94b88452b777db7240e5ed7cc9b3c804f2d17d5797137769d8f1b0ebe840508418144dd9a939b6cf9198e3d357e11097f5f72ed57c