Analysis
-
max time kernel
51s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
08/09/2022, 12:19
Static task
static1
General
-
Target
83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe
-
Size
1.8MB
-
MD5
36ca85645684f11e50e33b05f9b3c638
-
SHA1
54b21a88640132a1499c7090ff284db9dfb4fa34
-
SHA256
83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322
-
SHA512
914f301c2f7df60d973fd530df0b0d4a326a045656e9c83142293581bbbd36dbd881b7d73ff1e962a552278654ec1312ac4de323583515bf63a370d691ab14ad
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3968 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 3968 oobeldr.exe 3968 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe 1768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 3968 oobeldr.exe 3968 oobeldr.exe 3968 oobeldr.exe 3968 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1644 wrote to memory of 3640 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 67 PID 1644 wrote to memory of 3640 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 67 PID 1644 wrote to memory of 3640 1644 83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe 67 PID 3968 wrote to memory of 1768 3968 oobeldr.exe 70 PID 3968 wrote to memory of 1768 3968 oobeldr.exe 70 PID 3968 wrote to memory of 1768 3968 oobeldr.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe"C:\Users\Admin\AppData\Local\Temp\83b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3640
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD536ca85645684f11e50e33b05f9b3c638
SHA154b21a88640132a1499c7090ff284db9dfb4fa34
SHA25683b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322
SHA512914f301c2f7df60d973fd530df0b0d4a326a045656e9c83142293581bbbd36dbd881b7d73ff1e962a552278654ec1312ac4de323583515bf63a370d691ab14ad
-
Filesize
1.8MB
MD536ca85645684f11e50e33b05f9b3c638
SHA154b21a88640132a1499c7090ff284db9dfb4fa34
SHA25683b2b8754a5d7aeb66e16d868e0465f331b19927026a18e676791af912c46322
SHA512914f301c2f7df60d973fd530df0b0d4a326a045656e9c83142293581bbbd36dbd881b7d73ff1e962a552278654ec1312ac4de323583515bf63a370d691ab14ad