Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-09-2022 15:33
Static task
static1
General
-
Target
55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe
-
Size
1.8MB
-
MD5
9daa789a33a25513b01dfccf69087ba4
-
SHA1
4ddec7e78aa10a96c814e61b2e90f5b1d39eb107
-
SHA256
55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955
-
SHA512
9d7687ab8c3b62dfd62099aa3a26c3a09e9d5b90d78534fa91907dd24c0d197cf09791476da03a98fe1ecbc955f570051737027f6d2001f95c419f5b23ea33c7
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe -
Executes dropped EXE 1 IoCs
pid Process 3332 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 3332 oobeldr.exe 3332 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4880 schtasks.exe 1356 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 3332 oobeldr.exe 3332 oobeldr.exe 3332 oobeldr.exe 3332 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2500 wrote to memory of 4880 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 66 PID 2500 wrote to memory of 4880 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 66 PID 2500 wrote to memory of 4880 2500 55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe 66 PID 3332 wrote to memory of 1356 3332 oobeldr.exe 69 PID 3332 wrote to memory of 1356 3332 oobeldr.exe 69 PID 3332 wrote to memory of 1356 3332 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe"C:\Users\Admin\AppData\Local\Temp\55e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4880
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1356
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59daa789a33a25513b01dfccf69087ba4
SHA14ddec7e78aa10a96c814e61b2e90f5b1d39eb107
SHA25655e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955
SHA5129d7687ab8c3b62dfd62099aa3a26c3a09e9d5b90d78534fa91907dd24c0d197cf09791476da03a98fe1ecbc955f570051737027f6d2001f95c419f5b23ea33c7
-
Filesize
1.8MB
MD59daa789a33a25513b01dfccf69087ba4
SHA14ddec7e78aa10a96c814e61b2e90f5b1d39eb107
SHA25655e3bb6c20ea788186e1d8855bcfc442586e7cdfa5fc2590ca94ec413ec7f955
SHA5129d7687ab8c3b62dfd62099aa3a26c3a09e9d5b90d78534fa91907dd24c0d197cf09791476da03a98fe1ecbc955f570051737027f6d2001f95c419f5b23ea33c7