Analysis
-
max time kernel
53s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2022, 20:47
Static task
static1
General
-
Target
3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe
-
Size
1.8MB
-
MD5
f15de77c0a8861174395b9b9cafd64f3
-
SHA1
eb7e60a2047a908fe98c385a989b44c705991e14
-
SHA256
3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf
-
SHA512
9a9e54e8a7d0cc635963b37bfdf5321cd478fe8ebef84c9b05cb6944988f77c68262d44414c69962352c2c2c5728aeb02a6380ae06afd3a94d26e89ef2a0349d
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 4064 oobeldr.exe 4064 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe 1604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 4064 oobeldr.exe 4064 oobeldr.exe 4064 oobeldr.exe 4064 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2108 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 66 PID 2700 wrote to memory of 2108 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 66 PID 2700 wrote to memory of 2108 2700 3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe 66 PID 4064 wrote to memory of 1604 4064 oobeldr.exe 69 PID 4064 wrote to memory of 1604 4064 oobeldr.exe 69 PID 4064 wrote to memory of 1604 4064 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe"C:\Users\Admin\AppData\Local\Temp\3e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5f15de77c0a8861174395b9b9cafd64f3
SHA1eb7e60a2047a908fe98c385a989b44c705991e14
SHA2563e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf
SHA5129a9e54e8a7d0cc635963b37bfdf5321cd478fe8ebef84c9b05cb6944988f77c68262d44414c69962352c2c2c5728aeb02a6380ae06afd3a94d26e89ef2a0349d
-
Filesize
1.8MB
MD5f15de77c0a8861174395b9b9cafd64f3
SHA1eb7e60a2047a908fe98c385a989b44c705991e14
SHA2563e1ebb171443e0ebd2e6718e37f54e71da750b71b44ded7b5ef09a3ecb2728cf
SHA5129a9e54e8a7d0cc635963b37bfdf5321cd478fe8ebef84c9b05cb6944988f77c68262d44414c69962352c2c2c5728aeb02a6380ae06afd3a94d26e89ef2a0349d