Analysis
-
max time kernel
65s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/09/2022, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe
Resource
win7-20220901-en
General
-
Target
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe
-
Size
1.8MB
-
MD5
e4e81d7711386e7e3a42851b29f24434
-
SHA1
8143610c47f6af9007a4c44ef24878f4adb8a107
-
SHA256
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
-
SHA512
aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 1668 oobeldr.exe 1668 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1680 schtasks.exe 696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 1668 oobeldr.exe 1668 oobeldr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1680 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 27 PID 1696 wrote to memory of 1680 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 27 PID 1696 wrote to memory of 1680 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 27 PID 1696 wrote to memory of 1680 1696 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 27 PID 560 wrote to memory of 1668 560 taskeng.exe 30 PID 560 wrote to memory of 1668 560 taskeng.exe 30 PID 560 wrote to memory of 1668 560 taskeng.exe 30 PID 560 wrote to memory of 1668 560 taskeng.exe 30 PID 1668 wrote to memory of 696 1668 oobeldr.exe 31 PID 1668 wrote to memory of 696 1668 oobeldr.exe 31 PID 1668 wrote to memory of 696 1668 oobeldr.exe 31 PID 1668 wrote to memory of 696 1668 oobeldr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe"C:\Users\Admin\AppData\Local\Temp\2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1680
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8141CB5E-4609-4A22-85BD-3651B3C4EFD9} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:696
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e4e81d7711386e7e3a42851b29f24434
SHA18143610c47f6af9007a4c44ef24878f4adb8a107
SHA2562f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
SHA512aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81
-
Filesize
1.8MB
MD5e4e81d7711386e7e3a42851b29f24434
SHA18143610c47f6af9007a4c44ef24878f4adb8a107
SHA2562f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
SHA512aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81