Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2022, 08:28
Static task
static1
General
-
Target
539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe
-
Size
1.8MB
-
MD5
e9e03d8902c2c9c8f4b112817355a2ea
-
SHA1
1af7ab72de9634e0d7b25cc010fc116729283bf4
-
SHA256
539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a
-
SHA512
c433d34fc892be3177d50d666e61e0a09c22973ba6bec9e99b15e1fdadc1e9630a6454854dd5b18f4488412ecff2715cde4667fbeda6eab58e63433f694a34d2
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3532 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 3532 oobeldr.exe 3532 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe 632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 3532 oobeldr.exe 3532 oobeldr.exe 3532 oobeldr.exe 3532 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4912 wrote to memory of 1056 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 84 PID 4912 wrote to memory of 1056 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 84 PID 4912 wrote to memory of 1056 4912 539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe 84 PID 3532 wrote to memory of 632 3532 oobeldr.exe 95 PID 3532 wrote to memory of 632 3532 oobeldr.exe 95 PID 3532 wrote to memory of 632 3532 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe"C:\Users\Admin\AppData\Local\Temp\539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:632
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e9e03d8902c2c9c8f4b112817355a2ea
SHA11af7ab72de9634e0d7b25cc010fc116729283bf4
SHA256539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a
SHA512c433d34fc892be3177d50d666e61e0a09c22973ba6bec9e99b15e1fdadc1e9630a6454854dd5b18f4488412ecff2715cde4667fbeda6eab58e63433f694a34d2
-
Filesize
1.8MB
MD5e9e03d8902c2c9c8f4b112817355a2ea
SHA11af7ab72de9634e0d7b25cc010fc116729283bf4
SHA256539db95f1088e455db980c24041f8ff86b590a25699d9e02315af442857e719a
SHA512c433d34fc892be3177d50d666e61e0a09c22973ba6bec9e99b15e1fdadc1e9630a6454854dd5b18f4488412ecff2715cde4667fbeda6eab58e63433f694a34d2