Analysis
-
max time kernel
82s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2022 16:23
Static task
static1
General
-
Target
569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe
-
Size
1.8MB
-
MD5
ed0849fbaab10ceddfb4692e2f696095
-
SHA1
023b088547b79920a71917844531ee6cbfc5f1d9
-
SHA256
569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b
-
SHA512
a7dbdb58d2e8e3a269b95220539871b97c4578a1b1fec949603ab6e5baa0a4546a49e44145714097fb2470fb4340ea6b269c91338ccbf0d8bd8e6b3fb5b2d511
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1276 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 1276 oobeldr.exe 1276 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 440 schtasks.exe 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 1276 oobeldr.exe 1276 oobeldr.exe 1276 oobeldr.exe 1276 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 440 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 84 PID 4968 wrote to memory of 440 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 84 PID 4968 wrote to memory of 440 4968 569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe 84 PID 1276 wrote to memory of 2940 1276 oobeldr.exe 93 PID 1276 wrote to memory of 2940 1276 oobeldr.exe 93 PID 1276 wrote to memory of 2940 1276 oobeldr.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe"C:\Users\Admin\AppData\Local\Temp\569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:440
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ed0849fbaab10ceddfb4692e2f696095
SHA1023b088547b79920a71917844531ee6cbfc5f1d9
SHA256569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b
SHA512a7dbdb58d2e8e3a269b95220539871b97c4578a1b1fec949603ab6e5baa0a4546a49e44145714097fb2470fb4340ea6b269c91338ccbf0d8bd8e6b3fb5b2d511
-
Filesize
1.8MB
MD5ed0849fbaab10ceddfb4692e2f696095
SHA1023b088547b79920a71917844531ee6cbfc5f1d9
SHA256569fb26ee9669e5656339ca3142130ec9f5a703e3f8df03823e21a46b868450b
SHA512a7dbdb58d2e8e3a269b95220539871b97c4578a1b1fec949603ab6e5baa0a4546a49e44145714097fb2470fb4340ea6b269c91338ccbf0d8bd8e6b3fb5b2d511