Analysis
-
max time kernel
54s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
09-08-2022 05:23
Static task
static1
General
-
Target
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe
-
Size
1.8MB
-
MD5
82847af8b38ffd417e272c3de40e2329
-
SHA1
4b6be6a36ff45f59ca97a4eeb05a8123035e9cf8
-
SHA256
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
-
SHA512
9030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 2856 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exepid process 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 2856 oobeldr.exe 2856 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1936 schtasks.exe 2148 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exepid process 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe 2856 oobeldr.exe 2856 oobeldr.exe 2856 oobeldr.exe 2856 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exeoobeldr.exedescription pid process target process PID 3216 wrote to memory of 1936 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe schtasks.exe PID 3216 wrote to memory of 1936 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe schtasks.exe PID 3216 wrote to memory of 1936 3216 e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe schtasks.exe PID 2856 wrote to memory of 2148 2856 oobeldr.exe schtasks.exe PID 2856 wrote to memory of 2148 2856 oobeldr.exe schtasks.exe PID 2856 wrote to memory of 2148 2856 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe"C:\Users\Admin\AppData\Local\Temp\e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD582847af8b38ffd417e272c3de40e2329
SHA14b6be6a36ff45f59ca97a4eeb05a8123035e9cf8
SHA256e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
SHA5129030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD582847af8b38ffd417e272c3de40e2329
SHA14b6be6a36ff45f59ca97a4eeb05a8123035e9cf8
SHA256e24c10a0c58fef55a56d4870871293eac41effcddbe269baf9e9867b468f3b7c
SHA5129030cdc2824b606f895fe3c0155745b862ef8eeb2da09d3b8e08b947488ceaa1a7d2cdf6321b0fcf57d1439c0523582d60657312b3fc8d1d4897a99d541ea763
-
memory/1936-173-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-165-0x0000000000000000-mapping.dmp
-
memory/1936-180-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-179-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-167-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-168-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-169-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-170-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-178-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-183-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-182-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-181-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-172-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-166-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-171-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-177-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-175-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-176-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/1936-174-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/2148-232-0x0000000000000000-mapping.dmp
-
memory/2856-254-0x0000000000B40000-0x0000000000E5F000-memory.dmpFilesize
3.1MB
-
memory/2856-253-0x0000000000B40000-0x0000000000E5F000-memory.dmpFilesize
3.1MB
-
memory/2856-256-0x0000000000B40000-0x0000000000E5F000-memory.dmpFilesize
3.1MB
-
memory/2856-255-0x0000000001200000-0x000000000134A000-memory.dmpFilesize
1.3MB
-
memory/2856-205-0x0000000000B40000-0x0000000000E5F000-memory.dmpFilesize
3.1MB
-
memory/2856-251-0x0000000001200000-0x000000000134A000-memory.dmpFilesize
1.3MB
-
memory/2856-252-0x0000000000B40000-0x0000000000E5F000-memory.dmpFilesize
3.1MB
-
memory/3216-134-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-138-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-145-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-146-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-147-0x0000000002980000-0x00000000029C4000-memory.dmpFilesize
272KB
-
memory/3216-148-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-150-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-149-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-151-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-152-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-153-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-154-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-155-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-156-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-157-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-158-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-159-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-160-0x0000000000351000-0x0000000000353000-memory.dmpFilesize
8KB
-
memory/3216-161-0x0000000000351000-0x0000000000353000-memory.dmpFilesize
8KB
-
memory/3216-162-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-163-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-164-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-143-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-142-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-141-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-140-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-139-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-144-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-137-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-136-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-135-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-114-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-133-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-132-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-131-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-130-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-129-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-128-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-127-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-126-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-125-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-184-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-185-0x0000000002980000-0x00000000029C4000-memory.dmpFilesize
272KB
-
memory/3216-124-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-123-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-122-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-121-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-120-0x0000000000350000-0x000000000066F000-memory.dmpFilesize
3.1MB
-
memory/3216-119-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-118-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-117-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-116-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB
-
memory/3216-115-0x0000000077270000-0x00000000773FE000-memory.dmpFilesize
1.6MB