Analysis
-
max time kernel
114s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2022, 09:00
Static task
static1
General
-
Target
c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe
-
Size
1.8MB
-
MD5
faee240ace70ddedf7e2ffaf3fcafe8a
-
SHA1
f2fb38d1679252b140d2976bd2327b09d94f26d7
-
SHA256
c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57
-
SHA512
1fd3b643f5d2bfbf0bf12b0367b49df66da19824ff4fbf7a6ff9787bf5fae91ed8868e81f78bd64d0643aed3138b733fd51fe1f777696573143bfda4f5ae132e
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4968 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4968 oobeldr.exe 4968 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4840 schtasks.exe 3100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 4968 oobeldr.exe 4968 oobeldr.exe 4968 oobeldr.exe 4968 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4840 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 85 PID 4028 wrote to memory of 4840 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 85 PID 4028 wrote to memory of 4840 4028 c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe 85 PID 4968 wrote to memory of 3100 4968 oobeldr.exe 103 PID 4968 wrote to memory of 3100 4968 oobeldr.exe 103 PID 4968 wrote to memory of 3100 4968 oobeldr.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe"C:\Users\Admin\AppData\Local\Temp\c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4840
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3100
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5faee240ace70ddedf7e2ffaf3fcafe8a
SHA1f2fb38d1679252b140d2976bd2327b09d94f26d7
SHA256c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57
SHA5121fd3b643f5d2bfbf0bf12b0367b49df66da19824ff4fbf7a6ff9787bf5fae91ed8868e81f78bd64d0643aed3138b733fd51fe1f777696573143bfda4f5ae132e
-
Filesize
1.8MB
MD5faee240ace70ddedf7e2ffaf3fcafe8a
SHA1f2fb38d1679252b140d2976bd2327b09d94f26d7
SHA256c6e78d515e331b4b7913238f46518de27f2427155c00d207a93c740ca05a8a57
SHA5121fd3b643f5d2bfbf0bf12b0367b49df66da19824ff4fbf7a6ff9787bf5fae91ed8868e81f78bd64d0643aed3138b733fd51fe1f777696573143bfda4f5ae132e