Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2022, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe
Resource
win7-20220901-en
General
-
Target
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe
-
Size
1.8MB
-
MD5
e4e81d7711386e7e3a42851b29f24434
-
SHA1
8143610c47f6af9007a4c44ef24878f4adb8a107
-
SHA256
2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
-
SHA512
aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4644 oobeldr.exe 4644 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4476 schtasks.exe 4508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 4644 oobeldr.exe 4644 oobeldr.exe 4644 oobeldr.exe 4644 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4476 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 83 PID 4236 wrote to memory of 4476 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 83 PID 4236 wrote to memory of 4476 4236 2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe 83 PID 4644 wrote to memory of 4508 4644 oobeldr.exe 94 PID 4644 wrote to memory of 4508 4644 oobeldr.exe 94 PID 4644 wrote to memory of 4508 4644 oobeldr.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe"C:\Users\Admin\AppData\Local\Temp\2f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4476
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e4e81d7711386e7e3a42851b29f24434
SHA18143610c47f6af9007a4c44ef24878f4adb8a107
SHA2562f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
SHA512aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81
-
Filesize
1.8MB
MD5e4e81d7711386e7e3a42851b29f24434
SHA18143610c47f6af9007a4c44ef24878f4adb8a107
SHA2562f3433364eb52eeaf9597ba819769ca9dd4c597ffad8157650269a507cf952af
SHA512aba953eb6a5fc3d81a8b1929689b5f8b8ef479e153b03c98e9cfff21066093439af1844c19fb8ec58170b3b2f407eb2f46630e40afb43db3fa9ada550cd14d81