Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe
Resource
win10-20231215-en
General
-
Target
a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe
-
Size
324KB
-
MD5
85934bdf0c54ce3d93872595cf58cada
-
SHA1
8ca1628086eafccb4080a73bd706b54cbd9fa6b0
-
SHA256
a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315
-
SHA512
1b9871772f0e08a94552a0115faf003ac87adda0f989f7451079cd871e905d633ad4bc9ec2051dbf2aad1e6c9dc6dc29ea5d24f13305eb1685c84c8994158fe1
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2996 oobeldr.exe 1976 oobeldr.exe 2628 oobeldr.exe 2308 oobeldr.exe 1092 oobeldr.exe 1992 oobeldr.exe 1812 oobeldr.exe 1624 oobeldr.exe 2880 oobeldr.exe 280 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1720 set thread context of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 2996 set thread context of 1976 2996 oobeldr.exe 35 PID 2628 set thread context of 2308 2628 oobeldr.exe 39 PID 1092 set thread context of 1992 1092 oobeldr.exe 41 PID 1812 set thread context of 1624 1812 oobeldr.exe 43 PID 2880 set thread context of 280 2880 oobeldr.exe 45 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe 2868 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 1720 wrote to memory of 2088 1720 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 28 PID 2088 wrote to memory of 2844 2088 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 29 PID 2088 wrote to memory of 2844 2088 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 29 PID 2088 wrote to memory of 2844 2088 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 29 PID 2088 wrote to memory of 2844 2088 a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe 29 PID 2600 wrote to memory of 2996 2600 taskeng.exe 34 PID 2600 wrote to memory of 2996 2600 taskeng.exe 34 PID 2600 wrote to memory of 2996 2600 taskeng.exe 34 PID 2600 wrote to memory of 2996 2600 taskeng.exe 34 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 2996 wrote to memory of 1976 2996 oobeldr.exe 35 PID 1976 wrote to memory of 2868 1976 oobeldr.exe 36 PID 1976 wrote to memory of 2868 1976 oobeldr.exe 36 PID 1976 wrote to memory of 2868 1976 oobeldr.exe 36 PID 1976 wrote to memory of 2868 1976 oobeldr.exe 36 PID 2600 wrote to memory of 2628 2600 taskeng.exe 38 PID 2600 wrote to memory of 2628 2600 taskeng.exe 38 PID 2600 wrote to memory of 2628 2600 taskeng.exe 38 PID 2600 wrote to memory of 2628 2600 taskeng.exe 38 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2628 wrote to memory of 2308 2628 oobeldr.exe 39 PID 2600 wrote to memory of 1092 2600 taskeng.exe 40 PID 2600 wrote to memory of 1092 2600 taskeng.exe 40 PID 2600 wrote to memory of 1092 2600 taskeng.exe 40 PID 2600 wrote to memory of 1092 2600 taskeng.exe 40 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 1092 wrote to memory of 1992 1092 oobeldr.exe 41 PID 2600 wrote to memory of 1812 2600 taskeng.exe 42 PID 2600 wrote to memory of 1812 2600 taskeng.exe 42 PID 2600 wrote to memory of 1812 2600 taskeng.exe 42 PID 2600 wrote to memory of 1812 2600 taskeng.exe 42 PID 1812 wrote to memory of 1624 1812 oobeldr.exe 43 PID 1812 wrote to memory of 1624 1812 oobeldr.exe 43 PID 1812 wrote to memory of 1624 1812 oobeldr.exe 43 PID 1812 wrote to memory of 1624 1812 oobeldr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe"C:\Users\Admin\AppData\Local\Temp\a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exeC:\Users\Admin\AppData\Local\Temp\a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2844
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D1CF69EA-C659-40AA-AAEC-52FFE69A8B40} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:2868
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2308
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1992
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1624
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD585934bdf0c54ce3d93872595cf58cada
SHA18ca1628086eafccb4080a73bd706b54cbd9fa6b0
SHA256a59abee24d946f4d3c1c4fb6d99406c72da09e7cb56e4e404328f5c39a690315
SHA5121b9871772f0e08a94552a0115faf003ac87adda0f989f7451079cd871e905d633ad4bc9ec2051dbf2aad1e6c9dc6dc29ea5d24f13305eb1685c84c8994158fe1