Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
Resource
win10-20231215-en
General
-
Target
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
-
Size
324KB
-
MD5
d34e21cf5e2cdae88ff3ec4048014f1f
-
SHA1
f2fd9025fda77aed7bfb5b9d58c02ad33fd5cefe
-
SHA256
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73
-
SHA512
f1441435a3bd134dcfbea1ddbca2e81698612f4de1ac38806cd7dde8e93d3a65f6f2d09b15c634eb33f0bf9c1ea052d39f513872f9a37d4bb36a28ea4b2c50eb
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2960 oobeldr.exe 2188 oobeldr.exe 2432 oobeldr.exe 2192 oobeldr.exe 1988 oobeldr.exe 980 oobeldr.exe 1944 oobeldr.exe 2196 oobeldr.exe 1892 oobeldr.exe 2620 oobeldr.exe -
Loads dropped DLL 7 IoCs
pid Process 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe 1756 WerFault.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1044 set thread context of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 2960 set thread context of 2432 2960 oobeldr.exe 37 PID 2192 set thread context of 1988 2192 oobeldr.exe 40 PID 980 set thread context of 1944 980 oobeldr.exe 44 PID 2196 set thread context of 1892 2196 oobeldr.exe 46 -
Program crash 1 IoCs
pid pid_target Process procid_target 1756 2432 WerFault.exe 37 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe 1552 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1712 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 18 PID 1044 wrote to memory of 1712 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 18 PID 1044 wrote to memory of 1712 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 18 PID 1044 wrote to memory of 1712 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 18 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1044 wrote to memory of 1948 1044 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 29 PID 1948 wrote to memory of 2552 1948 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 31 PID 1948 wrote to memory of 2552 1948 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 31 PID 1948 wrote to memory of 2552 1948 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 31 PID 1948 wrote to memory of 2552 1948 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 31 PID 1956 wrote to memory of 2960 1956 taskeng.exe 35 PID 1956 wrote to memory of 2960 1956 taskeng.exe 35 PID 1956 wrote to memory of 2960 1956 taskeng.exe 35 PID 1956 wrote to memory of 2960 1956 taskeng.exe 35 PID 2960 wrote to memory of 2188 2960 oobeldr.exe 36 PID 2960 wrote to memory of 2188 2960 oobeldr.exe 36 PID 2960 wrote to memory of 2188 2960 oobeldr.exe 36 PID 2960 wrote to memory of 2188 2960 oobeldr.exe 36 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2960 wrote to memory of 2432 2960 oobeldr.exe 37 PID 2432 wrote to memory of 1756 2432 oobeldr.exe 38 PID 2432 wrote to memory of 1756 2432 oobeldr.exe 38 PID 2432 wrote to memory of 1756 2432 oobeldr.exe 38 PID 2432 wrote to memory of 1756 2432 oobeldr.exe 38 PID 1956 wrote to memory of 2192 1956 taskeng.exe 39 PID 1956 wrote to memory of 2192 1956 taskeng.exe 39 PID 1956 wrote to memory of 2192 1956 taskeng.exe 39 PID 1956 wrote to memory of 2192 1956 taskeng.exe 39 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 2192 wrote to memory of 1988 2192 oobeldr.exe 40 PID 1988 wrote to memory of 1552 1988 oobeldr.exe 42 PID 1988 wrote to memory of 1552 1988 oobeldr.exe 42 PID 1988 wrote to memory of 1552 1988 oobeldr.exe 42 PID 1988 wrote to memory of 1552 1988 oobeldr.exe 42 PID 1956 wrote to memory of 980 1956 taskeng.exe 43 PID 1956 wrote to memory of 980 1956 taskeng.exe 43 PID 1956 wrote to memory of 980 1956 taskeng.exe 43 PID 1956 wrote to memory of 980 1956 taskeng.exe 43 PID 980 wrote to memory of 1944 980 oobeldr.exe 44 PID 980 wrote to memory of 1944 980 oobeldr.exe 44 PID 980 wrote to memory of 1944 980 oobeldr.exe 44 PID 980 wrote to memory of 1944 980 oobeldr.exe 44 PID 980 wrote to memory of 1944 980 oobeldr.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exeC:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe2⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exeC:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2552
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {968ED241-18BB-4668-9F09-030E8FB676D2} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 1164⤵
- Loads dropped DLL
- Program crash
PID:1756
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1944
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2196 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1892
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5db5d7db73caa8fbdfec6c9634441af56
SHA1d8780c6a06194dc9f20470e654edc8ba99307452
SHA256d5d7ad5826ea2fcf1b02874e6c4a452c42d1bf6752d42d899e0407f3b8ed3b11
SHA5123b14debd2e049af885f0fbc98506c5d5a4a11005e00b5b1990674048bd889ea41832f70f7500f07ecabed9861219332df9ce48da4f0efc2e9ed798a1979dbe7a
-
Filesize
21KB
MD5b53a7d6aa4cc435e1b5ad8e6cc0a8ad6
SHA16426d1cbd3917972aea46071c1c44d52005848c8
SHA25663cbfb7475fa40eb1b639f1a6f62ac4d7f3621769d525b3792806eb435d0a1d4
SHA51226d9ae3c240f053126cc2fc97b4568a279d83e7828b9badfe730d56337444259313d6397f30e3e9584b251eed64f260c63246d937bbba837ce1b1d91d606d9d8
-
Filesize
84KB
MD56f4e5acc96eabda07434f7a3065f4599
SHA1846e4b6552d8586c92c6502c662fe5c8ba85262b
SHA256c6d7209e1a5764b41c8e595c3a48da2b009996e3797025400b232629ca07bd0b
SHA5128bfb4c83a4bc0481194437a7600116e50d77adbd04467dadc3abc5b39e93de3909c7fbb886498124f651b161e61d991b9ae35cce9a9327be035b8a4504b67b23
-
Filesize
110KB
MD5b49cf03be64f9ab2e1bdcde0c2e12e98
SHA1b9441598c72ce746fcd4c496178dfa8261a1af8d
SHA2567d3102dc2255bd8f69a8b95ae37c048224b266cee8153b45a69542a63c272da7
SHA512929bc092fb0f04ee35500dd2179a2f30c1b3c8901ffa5261ad609498fd3101561fe750ec39b0666e4a708e9306c5a442f37c404dd45c8d2c5a903e10e6f94b09
-
Filesize
61KB
MD5561f01298caf8e787cf81d432bd41ced
SHA1ed135cef9194b60d9e4b5488362d0702d62b1fd5
SHA256f10cde927a65c335d370aa9bc46daee2c7162b59d90ed90b68127515bef03253
SHA512d135f3a94c718711df21378acea17986ba082de7b1be282c0f5098643b5d3a481ee81b827dec98888f817af94d677bc219548ab6b1a85e857310073f970c8632
-
Filesize
28KB
MD54318d1df47690e3fa50f80c5bea20668
SHA19a1bede72fbcf462429f46401c81fb7b6eb4cb49
SHA256efff27ffb73a467990103bda449082b3215a2ce6732f59b5837f2fe0f0738546
SHA5127a4a9a3e90e6f71d752a681c93aebb0bbde40104c45dc9177ee9706dd54cf3fe8242a5d66ff1cb8b65e8a71311520fb4b4b5edaf0e772ab67ea1c9466c490a35
-
Filesize
63KB
MD588be1a5626e9177036e4f94ce8c4be2a
SHA1396e1e080af9315d673091f1422197f8b41842bb
SHA256532a35e9a7be3dca3302b5b4a014ecaf06025df8c283414afe52b64aa345fc78
SHA5123efc36d57bfeff26d9d98a9038e2b7129653330e909d659f162d8d00275d66be673986b61c1097a70c13efa18ca43c3ccff0f4b44051c39d9c9e9578e98cfcea
-
Filesize
115KB
MD5532fd3bd693e74206efd91af39d7f2fc
SHA1dab3ec5051ee68af12234f99981cb2f7265fce75
SHA25649361c22cad72bd47641fffe2296d99c110ed20b89ed8d4a945e3f9624202ea1
SHA51292c23ab9441bcdd99e42b4716b8a4d8e417dc5a5ba256fbba17fddc29025ae0ab6dcbe331242f58a22ab8f070328893cc1fd017cd2192edc6effe9a348cf0e9e
-
Filesize
279KB
MD57f844f60f99cd0314c31c8b26c9a1174
SHA16c0462015ed93b6c72bb4f8b8a335d9787d164a3
SHA25690cce56da1d7b9a18eda032751d5d83990709752e10a0df1e8e4b4b0d0827433
SHA51276c3d1128be604e3963eb50e76d60d0b93b65af483ab06175be7aaf20b850b3271fb2a15e91ce2b6aef6db2f6b00099c80b4786534dbd5a0c709e6dcd4668dc6
-
Filesize
116KB
MD5bd89bcc4139b2ea6b86f1d4c499e8bf7
SHA10eaf778a3377c41e553d2389bd3d9d806e5dc171
SHA256adec70d69925a52306a2e70450f536c828b89cf7a10d27a0b9fd4218eda44452
SHA51210b608ae9db9f430b2b2a696aab63f7c3be6a4943fce0f770a67d1bda92e10cbc43b296c6954fec542b712387fa62a6ed4fe202245312dba6b5da8738c525c59
-
Filesize
48KB
MD51a5897814a51ac3c02851c1beef046db
SHA1da82ba829278a6b95548ec50e4356427891d7479
SHA25669a3e860040f2dc32221d37ac6aa68e786e5a351278973f7ddc16308ed66273c
SHA5125a88435fe75dd1e0a9fae9cd994b4eac8d169043dea7bcdc6ec5336f6a140a5e7149a7e89486e64a33f065434bcb66df981a492eadaff1f74580b7b5bbcc3e2f
-
Filesize
113KB
MD5a27272cb646e86696674a3c890b7d307
SHA1d26a38899b03dcbaddfe052796fa5123f80d624f
SHA25649dfdcd46a6983c8f5b4f38b354b2b120ce4717d5262223a42f024d5acc02b6c
SHA5121ef4ba5bbe56b918a096c6dbeea9b6e26406b077e24f13f2ff1c38f5919cd602e2c9ecfe1eaaaea38d307b5595bf558d8dc824ca3867f30c2767b237ea5f409f
-
Filesize
82KB
MD5e77916edf80b6efd0416534dd0e3016c
SHA1c49438e57f244372ef295744dc36c941f88b7cac
SHA256b15b931cf5c9a9c8527892e335f2afb6cbe066c755407c0dfa776c1dd463ee99
SHA5123c2b6960b2e253823651ca9bc1baecd84e1e3888e8e8c79e2513330e22319b3f831be7da48bf41b25675fc9fb32d1ca22670836402ea0f0f6061d770d15f47be
-
Filesize
66KB
MD507db6ebefe839f768122e77c85a8d427
SHA189636e446e091785de2ffbfb5ded77b599cf17cc
SHA2563d6a2627a1b76c8ba33958d06bdf4eededccd9715e0ebc6e90289613bd1d66cb
SHA5127c4ddcb77b61501337093f0bce76be10f33a3db8f01e048d5bf42180d322083d6dd86dd63804a2a9536a22f47378fa2822a98af6a0ae120828419b40d0d30c76
-
Filesize
67KB
MD5135b92a76999af59e82acf97d0fb9f7d
SHA10fd389e9e85c894495c4ac3221e071654f5ebfa2
SHA25655f76f964e0fb07aed57ef20f2041b025ec6b9cc00906f6d35dfab50529d4a0d
SHA512e652a6730bfc015de1ed9dca77fbff8772bae5715477f0c40e29ad74254a8f79204847f8627a59f44d9ace59d173f430e2855b92b3e46e6f61f811f8bf57beb7
-
Filesize
142KB
MD5cc4571ed348559b7526be44889cd0a3b
SHA15982ebed3865874411e5666355bb8e38a1193f6d
SHA256aff2cf2db37c82a59fac51d8f0134700f6aa55ab75648bcbc6a41104ed5553eb
SHA512c7a5d4ee20dd50b5cc0ab675546ab5570aa0e316ad5ebc0d2de766227a36b79e65f16bede81187cc51ceb2dc55fb59b160129832753197a7987203c827fb1ed1
-
Filesize
30KB
MD52a224fe435b95381c2a657ca952ca0fb
SHA1e41450dff78d6e07de2b862434de6ced80fcd232
SHA2562bb644dcad9eb200f816ced3f52ec59d110173018c126abedc839c17cf08a27d
SHA5126a9758b85f6e427f93aac77e818be67075fef48ac38188124f3038a74b4fc86e58b71eb774973c98b88906784f453954cd15d0e7a7f732bf73af40f14c496914