Analysis
-
max time kernel
50s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
07-09-2022 22:21
Static task
static1
General
-
Target
6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe
-
Size
1.8MB
-
MD5
45fd0ac9ed803218d1e6886c7b5607bf
-
SHA1
390aaaa3504a2fe8569177c5342440276ec28568
-
SHA256
6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55
-
SHA512
16da04eddfe59e307f4369011e773d20235139a48680e7c64a7651a7e15fe50fe408663e0bf04b97bc97a64f30f1a2605ce642ed0656b560162ee4e548578a7d
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 4976 oobeldr.exe 4976 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2044 schtasks.exe 3172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 4976 oobeldr.exe 4976 oobeldr.exe 4976 oobeldr.exe 4976 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2044 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 66 PID 3512 wrote to memory of 2044 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 66 PID 3512 wrote to memory of 2044 3512 6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe 66 PID 4976 wrote to memory of 3172 4976 oobeldr.exe 69 PID 4976 wrote to memory of 3172 4976 oobeldr.exe 69 PID 4976 wrote to memory of 3172 4976 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe"C:\Users\Admin\AppData\Local\Temp\6b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2044
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3172
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD545fd0ac9ed803218d1e6886c7b5607bf
SHA1390aaaa3504a2fe8569177c5342440276ec28568
SHA2566b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55
SHA51216da04eddfe59e307f4369011e773d20235139a48680e7c64a7651a7e15fe50fe408663e0bf04b97bc97a64f30f1a2605ce642ed0656b560162ee4e548578a7d
-
Filesize
1.8MB
MD545fd0ac9ed803218d1e6886c7b5607bf
SHA1390aaaa3504a2fe8569177c5342440276ec28568
SHA2566b4eb8245c20194e48d7df9cff7ceab38fcdb2fdb5267db0a473b8639a858f55
SHA51216da04eddfe59e307f4369011e773d20235139a48680e7c64a7651a7e15fe50fe408663e0bf04b97bc97a64f30f1a2605ce642ed0656b560162ee4e548578a7d