Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    284s
  • max time network
    257s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/11/2023, 04:48

General

  • Target

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe

  • Size

    323KB

  • MD5

    bbb53b948b10672b93e596bcaa4f9c28

  • SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

  • SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

  • SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
    "C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
      C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
      2⤵
        PID:4760
      • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
        C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
        2⤵
          PID:500
        • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
          C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4924
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
            3⤵
            • Creates scheduled task(s)
            PID:1580
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3820
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
            3⤵
            • Creates scheduled task(s)
            PID:3720
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1188
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:368
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:4688
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:2708
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:2224
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2860
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          2⤵
          • Executes dropped EXE
          PID:4736

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

        Filesize

        789B

        MD5

        db5ef8d7c51bad129d9097bf953e4913

        SHA1

        8439db960aa2d431bf5ec3c37af775b45eb07e06

        SHA256

        1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

        SHA512

        04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        323KB

        MD5

        bbb53b948b10672b93e596bcaa4f9c28

        SHA1

        7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

        SHA256

        1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

        SHA512

        d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

      • memory/1188-35-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/1188-28-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/1188-29-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2224-51-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2760-43-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/2760-38-0x0000000005890000-0x00000000058A0000-memory.dmp

        Filesize

        64KB

      • memory/2760-37-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/2860-60-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/2860-54-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/2860-55-0x0000000005340000-0x0000000005350000-memory.dmp

        Filesize

        64KB

      • memory/3820-25-0x0000000073AC0000-0x00000000741AE000-memory.dmp

        Filesize

        6.9MB

      • memory/3820-19-0x0000000005660000-0x0000000005670000-memory.dmp

        Filesize

        64KB

      • memory/3820-18-0x0000000073AC0000-0x00000000741AE000-memory.dmp

        Filesize

        6.9MB

      • memory/4632-7-0x0000000007A70000-0x0000000007AE6000-memory.dmp

        Filesize

        472KB

      • memory/4632-8-0x0000000007730000-0x000000000774E000-memory.dmp

        Filesize

        120KB

      • memory/4632-13-0x0000000073AC0000-0x00000000741AE000-memory.dmp

        Filesize

        6.9MB

      • memory/4632-6-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/4632-0-0x0000000000900000-0x0000000000956000-memory.dmp

        Filesize

        344KB

      • memory/4632-5-0x0000000005160000-0x0000000005166000-memory.dmp

        Filesize

        24KB

      • memory/4632-1-0x0000000073AC0000-0x00000000741AE000-memory.dmp

        Filesize

        6.9MB

      • memory/4632-2-0x0000000007660000-0x000000000772C000-memory.dmp

        Filesize

        816KB

      • memory/4632-4-0x00000000077D0000-0x0000000007862000-memory.dmp

        Filesize

        584KB

      • memory/4632-3-0x0000000007C30000-0x000000000812E000-memory.dmp

        Filesize

        5.0MB

      • memory/4660-52-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/4660-46-0x0000000004C50000-0x0000000004C60000-memory.dmp

        Filesize

        64KB

      • memory/4660-45-0x0000000073B60000-0x000000007424E000-memory.dmp

        Filesize

        6.9MB

      • memory/4924-9-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/4924-12-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/4924-15-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB