Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-09-2022 12:27
Static task
static1
General
-
Target
7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe
-
Size
1.8MB
-
MD5
a18c0a6b2e0279484f0ecf759dfae288
-
SHA1
44b967df68e510ce799d8d33bb514943a216ec14
-
SHA256
7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708
-
SHA512
a5044927acb7661ca4d779815bc17f89367b44b1170cbb54fd8d751c6d005dec2e39413efc86708b86f3a4cb2d9d8773565da56f084bc3ab8eff4ff303211b40
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe -
Executes dropped EXE 1 IoCs
pid Process 940 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 940 oobeldr.exe 940 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4760 schtasks.exe 3536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 940 oobeldr.exe 940 oobeldr.exe 940 oobeldr.exe 940 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4760 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 66 PID 3468 wrote to memory of 4760 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 66 PID 3468 wrote to memory of 4760 3468 7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe 66 PID 940 wrote to memory of 3536 940 oobeldr.exe 69 PID 940 wrote to memory of 3536 940 oobeldr.exe 69 PID 940 wrote to memory of 3536 940 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe"C:\Users\Admin\AppData\Local\Temp\7a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4760
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a18c0a6b2e0279484f0ecf759dfae288
SHA144b967df68e510ce799d8d33bb514943a216ec14
SHA2567a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708
SHA512a5044927acb7661ca4d779815bc17f89367b44b1170cbb54fd8d751c6d005dec2e39413efc86708b86f3a4cb2d9d8773565da56f084bc3ab8eff4ff303211b40
-
Filesize
1.8MB
MD5a18c0a6b2e0279484f0ecf759dfae288
SHA144b967df68e510ce799d8d33bb514943a216ec14
SHA2567a48a9d87b09d0c130eca999fd8cb1d982df5cbd1a9cb2e4685db81fe34a6708
SHA512a5044927acb7661ca4d779815bc17f89367b44b1170cbb54fd8d751c6d005dec2e39413efc86708b86f3a4cb2d9d8773565da56f084bc3ab8eff4ff303211b40