Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2022, 17:59
Static task
static1
General
-
Target
360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe
-
Size
1.8MB
-
MD5
82ce7de0da5627187fdc958f5240a93d
-
SHA1
4bc7c7b6dc1d6cf1f52d4e79f09acd51ae49216f
-
SHA256
360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8
-
SHA512
a8d34810bebbea539748dbb6298f42f2e0ade11e0c513919df97f7a2f041eaa82a7bf3e076c18723e4abb3792be3aa9ce274fa5ba9dd57019d22af9ca497f231
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2448 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 2448 oobeldr.exe 2448 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5000 schtasks.exe 4376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 2448 oobeldr.exe 2448 oobeldr.exe 2448 oobeldr.exe 2448 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4824 wrote to memory of 5000 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 84 PID 4824 wrote to memory of 5000 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 84 PID 4824 wrote to memory of 5000 4824 360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe 84 PID 2448 wrote to memory of 4376 2448 oobeldr.exe 95 PID 2448 wrote to memory of 4376 2448 oobeldr.exe 95 PID 2448 wrote to memory of 4376 2448 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe"C:\Users\Admin\AppData\Local\Temp\360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5000
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD582ce7de0da5627187fdc958f5240a93d
SHA14bc7c7b6dc1d6cf1f52d4e79f09acd51ae49216f
SHA256360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8
SHA512a8d34810bebbea539748dbb6298f42f2e0ade11e0c513919df97f7a2f041eaa82a7bf3e076c18723e4abb3792be3aa9ce274fa5ba9dd57019d22af9ca497f231
-
Filesize
1.8MB
MD582ce7de0da5627187fdc958f5240a93d
SHA14bc7c7b6dc1d6cf1f52d4e79f09acd51ae49216f
SHA256360d827690f49525cffa591e70660bf8112c6f5b5c3cea2a1776ceec464b23e8
SHA512a8d34810bebbea539748dbb6298f42f2e0ade11e0c513919df97f7a2f041eaa82a7bf3e076c18723e4abb3792be3aa9ce274fa5ba9dd57019d22af9ca497f231