Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    295s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 04:53

General

  • Target

    6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe

  • Size

    324KB

  • MD5

    d34e21cf5e2cdae88ff3ec4048014f1f

  • SHA1

    f2fd9025fda77aed7bfb5b9d58c02ad33fd5cefe

  • SHA256

    6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73

  • SHA512

    f1441435a3bd134dcfbea1ddbca2e81698612f4de1ac38806cd7dde8e93d3a65f6f2d09b15c634eb33f0bf9c1ea052d39f513872f9a37d4bb36a28ea4b2c50eb

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
    "C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
      C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
      2⤵
        PID:1712
      • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
        C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2552
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {968ED241-18BB-4668-9F09-030E8FB676D2} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:2188
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 116
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1756
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1552
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:1944
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2196
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:1892
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:2620
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
            PID:2516

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        102KB

        MD5

        db5d7db73caa8fbdfec6c9634441af56

        SHA1

        d8780c6a06194dc9f20470e654edc8ba99307452

        SHA256

        d5d7ad5826ea2fcf1b02874e6c4a452c42d1bf6752d42d899e0407f3b8ed3b11

        SHA512

        3b14debd2e049af885f0fbc98506c5d5a4a11005e00b5b1990674048bd889ea41832f70f7500f07ecabed9861219332df9ce48da4f0efc2e9ed798a1979dbe7a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        21KB

        MD5

        b53a7d6aa4cc435e1b5ad8e6cc0a8ad6

        SHA1

        6426d1cbd3917972aea46071c1c44d52005848c8

        SHA256

        63cbfb7475fa40eb1b639f1a6f62ac4d7f3621769d525b3792806eb435d0a1d4

        SHA512

        26d9ae3c240f053126cc2fc97b4568a279d83e7828b9badfe730d56337444259313d6397f30e3e9584b251eed64f260c63246d937bbba837ce1b1d91d606d9d8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        84KB

        MD5

        6f4e5acc96eabda07434f7a3065f4599

        SHA1

        846e4b6552d8586c92c6502c662fe5c8ba85262b

        SHA256

        c6d7209e1a5764b41c8e595c3a48da2b009996e3797025400b232629ca07bd0b

        SHA512

        8bfb4c83a4bc0481194437a7600116e50d77adbd04467dadc3abc5b39e93de3909c7fbb886498124f651b161e61d991b9ae35cce9a9327be035b8a4504b67b23

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        110KB

        MD5

        b49cf03be64f9ab2e1bdcde0c2e12e98

        SHA1

        b9441598c72ce746fcd4c496178dfa8261a1af8d

        SHA256

        7d3102dc2255bd8f69a8b95ae37c048224b266cee8153b45a69542a63c272da7

        SHA512

        929bc092fb0f04ee35500dd2179a2f30c1b3c8901ffa5261ad609498fd3101561fe750ec39b0666e4a708e9306c5a442f37c404dd45c8d2c5a903e10e6f94b09

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        61KB

        MD5

        561f01298caf8e787cf81d432bd41ced

        SHA1

        ed135cef9194b60d9e4b5488362d0702d62b1fd5

        SHA256

        f10cde927a65c335d370aa9bc46daee2c7162b59d90ed90b68127515bef03253

        SHA512

        d135f3a94c718711df21378acea17986ba082de7b1be282c0f5098643b5d3a481ee81b827dec98888f817af94d677bc219548ab6b1a85e857310073f970c8632

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        28KB

        MD5

        4318d1df47690e3fa50f80c5bea20668

        SHA1

        9a1bede72fbcf462429f46401c81fb7b6eb4cb49

        SHA256

        efff27ffb73a467990103bda449082b3215a2ce6732f59b5837f2fe0f0738546

        SHA512

        7a4a9a3e90e6f71d752a681c93aebb0bbde40104c45dc9177ee9706dd54cf3fe8242a5d66ff1cb8b65e8a71311520fb4b4b5edaf0e772ab67ea1c9466c490a35

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        63KB

        MD5

        88be1a5626e9177036e4f94ce8c4be2a

        SHA1

        396e1e080af9315d673091f1422197f8b41842bb

        SHA256

        532a35e9a7be3dca3302b5b4a014ecaf06025df8c283414afe52b64aa345fc78

        SHA512

        3efc36d57bfeff26d9d98a9038e2b7129653330e909d659f162d8d00275d66be673986b61c1097a70c13efa18ca43c3ccff0f4b44051c39d9c9e9578e98cfcea

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        115KB

        MD5

        532fd3bd693e74206efd91af39d7f2fc

        SHA1

        dab3ec5051ee68af12234f99981cb2f7265fce75

        SHA256

        49361c22cad72bd47641fffe2296d99c110ed20b89ed8d4a945e3f9624202ea1

        SHA512

        92c23ab9441bcdd99e42b4716b8a4d8e417dc5a5ba256fbba17fddc29025ae0ab6dcbe331242f58a22ab8f070328893cc1fd017cd2192edc6effe9a348cf0e9e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        279KB

        MD5

        7f844f60f99cd0314c31c8b26c9a1174

        SHA1

        6c0462015ed93b6c72bb4f8b8a335d9787d164a3

        SHA256

        90cce56da1d7b9a18eda032751d5d83990709752e10a0df1e8e4b4b0d0827433

        SHA512

        76c3d1128be604e3963eb50e76d60d0b93b65af483ab06175be7aaf20b850b3271fb2a15e91ce2b6aef6db2f6b00099c80b4786534dbd5a0c709e6dcd4668dc6

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        116KB

        MD5

        bd89bcc4139b2ea6b86f1d4c499e8bf7

        SHA1

        0eaf778a3377c41e553d2389bd3d9d806e5dc171

        SHA256

        adec70d69925a52306a2e70450f536c828b89cf7a10d27a0b9fd4218eda44452

        SHA512

        10b608ae9db9f430b2b2a696aab63f7c3be6a4943fce0f770a67d1bda92e10cbc43b296c6954fec542b712387fa62a6ed4fe202245312dba6b5da8738c525c59

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        48KB

        MD5

        1a5897814a51ac3c02851c1beef046db

        SHA1

        da82ba829278a6b95548ec50e4356427891d7479

        SHA256

        69a3e860040f2dc32221d37ac6aa68e786e5a351278973f7ddc16308ed66273c

        SHA512

        5a88435fe75dd1e0a9fae9cd994b4eac8d169043dea7bcdc6ec5336f6a140a5e7149a7e89486e64a33f065434bcb66df981a492eadaff1f74580b7b5bbcc3e2f

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        113KB

        MD5

        a27272cb646e86696674a3c890b7d307

        SHA1

        d26a38899b03dcbaddfe052796fa5123f80d624f

        SHA256

        49dfdcd46a6983c8f5b4f38b354b2b120ce4717d5262223a42f024d5acc02b6c

        SHA512

        1ef4ba5bbe56b918a096c6dbeea9b6e26406b077e24f13f2ff1c38f5919cd602e2c9ecfe1eaaaea38d307b5595bf558d8dc824ca3867f30c2767b237ea5f409f

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        82KB

        MD5

        e77916edf80b6efd0416534dd0e3016c

        SHA1

        c49438e57f244372ef295744dc36c941f88b7cac

        SHA256

        b15b931cf5c9a9c8527892e335f2afb6cbe066c755407c0dfa776c1dd463ee99

        SHA512

        3c2b6960b2e253823651ca9bc1baecd84e1e3888e8e8c79e2513330e22319b3f831be7da48bf41b25675fc9fb32d1ca22670836402ea0f0f6061d770d15f47be

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        66KB

        MD5

        07db6ebefe839f768122e77c85a8d427

        SHA1

        89636e446e091785de2ffbfb5ded77b599cf17cc

        SHA256

        3d6a2627a1b76c8ba33958d06bdf4eededccd9715e0ebc6e90289613bd1d66cb

        SHA512

        7c4ddcb77b61501337093f0bce76be10f33a3db8f01e048d5bf42180d322083d6dd86dd63804a2a9536a22f47378fa2822a98af6a0ae120828419b40d0d30c76

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        67KB

        MD5

        135b92a76999af59e82acf97d0fb9f7d

        SHA1

        0fd389e9e85c894495c4ac3221e071654f5ebfa2

        SHA256

        55f76f964e0fb07aed57ef20f2041b025ec6b9cc00906f6d35dfab50529d4a0d

        SHA512

        e652a6730bfc015de1ed9dca77fbff8772bae5715477f0c40e29ad74254a8f79204847f8627a59f44d9ace59d173f430e2855b92b3e46e6f61f811f8bf57beb7

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        142KB

        MD5

        cc4571ed348559b7526be44889cd0a3b

        SHA1

        5982ebed3865874411e5666355bb8e38a1193f6d

        SHA256

        aff2cf2db37c82a59fac51d8f0134700f6aa55ab75648bcbc6a41104ed5553eb

        SHA512

        c7a5d4ee20dd50b5cc0ab675546ab5570aa0e316ad5ebc0d2de766227a36b79e65f16bede81187cc51ceb2dc55fb59b160129832753197a7987203c827fb1ed1

      • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

        Filesize

        30KB

        MD5

        2a224fe435b95381c2a657ca952ca0fb

        SHA1

        e41450dff78d6e07de2b862434de6ced80fcd232

        SHA256

        2bb644dcad9eb200f816ced3f52ec59d110173018c126abedc839c17cf08a27d

        SHA512

        6a9758b85f6e427f93aac77e818be67075fef48ac38188124f3038a74b4fc86e58b71eb774973c98b88906784f453954cd15d0e7a7f732bf73af40f14c496914

      • memory/980-71-0x0000000072E00000-0x00000000734EE000-memory.dmp

        Filesize

        6.9MB

      • memory/980-59-0x0000000072E00000-0x00000000734EE000-memory.dmp

        Filesize

        6.9MB

      • memory/980-60-0x00000000048F0000-0x0000000004930000-memory.dmp

        Filesize

        256KB

      • memory/980-58-0x0000000000A20000-0x0000000000A76000-memory.dmp

        Filesize

        344KB

      • memory/1044-0-0x0000000000E60000-0x0000000000EB6000-memory.dmp

        Filesize

        344KB

      • memory/1044-14-0x0000000074990000-0x000000007507E000-memory.dmp

        Filesize

        6.9MB

      • memory/1044-1-0x0000000074990000-0x000000007507E000-memory.dmp

        Filesize

        6.9MB

      • memory/1044-2-0x0000000006BE0000-0x0000000006CAC000-memory.dmp

        Filesize

        816KB

      • memory/1044-3-0x00000000008B0000-0x00000000008B6000-memory.dmp

        Filesize

        24KB

      • memory/1044-4-0x0000000004700000-0x0000000004740000-memory.dmp

        Filesize

        256KB

      • memory/1944-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1948-6-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/1948-7-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-8-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-13-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-5-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-16-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/1948-11-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2192-56-0x00000000734F0000-0x0000000073BDE000-memory.dmp

        Filesize

        6.9MB

      • memory/2192-45-0x0000000004B30000-0x0000000004B70000-memory.dmp

        Filesize

        256KB

      • memory/2192-43-0x0000000000A20000-0x0000000000A76000-memory.dmp

        Filesize

        344KB

      • memory/2192-44-0x00000000734F0000-0x0000000073BDE000-memory.dmp

        Filesize

        6.9MB

      • memory/2196-73-0x00000000734F0000-0x0000000073BDE000-memory.dmp

        Filesize

        6.9MB

      • memory/2196-83-0x00000000734F0000-0x0000000073BDE000-memory.dmp

        Filesize

        6.9MB

      • memory/2432-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2620-86-0x0000000072E00000-0x00000000734EE000-memory.dmp

        Filesize

        6.9MB

      • memory/2960-34-0x00000000749D0000-0x00000000750BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2960-21-0x00000000049A0000-0x00000000049E0000-memory.dmp

        Filesize

        256KB

      • memory/2960-19-0x0000000000A20000-0x0000000000A76000-memory.dmp

        Filesize

        344KB

      • memory/2960-20-0x00000000749D0000-0x00000000750BE000-memory.dmp

        Filesize

        6.9MB