Analysis
-
max time kernel
84s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 06:16
Static task
static1
General
-
Target
62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe
-
Size
1.8MB
-
MD5
83e1154011bfac8de84c2b9c474b2139
-
SHA1
49bfdb88cdf161d015981fa00eace912a640be11
-
SHA256
62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2
-
SHA512
cd4deff6b48503d133944df660cd5da810c90675bc8ec94fb4c4a1adc9126764fe791a46849bbbf4fc39c7db1e22241e043d9373a681662a8916b7827b65755e
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 2068 oobeldr.exe 2068 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe 4492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 2068 oobeldr.exe 2068 oobeldr.exe 2068 oobeldr.exe 2068 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4424 wrote to memory of 3340 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 84 PID 4424 wrote to memory of 3340 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 84 PID 4424 wrote to memory of 3340 4424 62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe 84 PID 2068 wrote to memory of 4492 2068 oobeldr.exe 101 PID 2068 wrote to memory of 4492 2068 oobeldr.exe 101 PID 2068 wrote to memory of 4492 2068 oobeldr.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe"C:\Users\Admin\AppData\Local\Temp\62a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3340
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD583e1154011bfac8de84c2b9c474b2139
SHA149bfdb88cdf161d015981fa00eace912a640be11
SHA25662a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2
SHA512cd4deff6b48503d133944df660cd5da810c90675bc8ec94fb4c4a1adc9126764fe791a46849bbbf4fc39c7db1e22241e043d9373a681662a8916b7827b65755e
-
Filesize
1.8MB
MD583e1154011bfac8de84c2b9c474b2139
SHA149bfdb88cdf161d015981fa00eace912a640be11
SHA25662a32dcf5effc9185a42b306ed8a8af464538937add4f0fc86b5c8f01881f2b2
SHA512cd4deff6b48503d133944df660cd5da810c90675bc8ec94fb4c4a1adc9126764fe791a46849bbbf4fc39c7db1e22241e043d9373a681662a8916b7827b65755e