Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2022, 15:51
Static task
static1
General
-
Target
33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe
-
Size
1.8MB
-
MD5
b0bec3723324217c508755b97896f4e9
-
SHA1
a16691727b4f92fe742ca41a625dc72f1bece904
-
SHA256
33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f
-
SHA512
a6034e6b0c3a8adb106f15ccef52f9661ded03b108638c844c7e8fe806ccd98f895e2cc3ba5dc9b516bf9c6d41b88d0103cd7f7b3d0565b9ffdfa2331f890c81
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 3384 oobeldr.exe 3384 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe 3752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 3384 oobeldr.exe 3384 oobeldr.exe 3384 oobeldr.exe 3384 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4552 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 66 PID 2016 wrote to memory of 4552 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 66 PID 2016 wrote to memory of 4552 2016 33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe 66 PID 3384 wrote to memory of 3752 3384 oobeldr.exe 69 PID 3384 wrote to memory of 3752 3384 oobeldr.exe 69 PID 3384 wrote to memory of 3752 3384 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe"C:\Users\Admin\AppData\Local\Temp\33472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4552
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b0bec3723324217c508755b97896f4e9
SHA1a16691727b4f92fe742ca41a625dc72f1bece904
SHA25633472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f
SHA512a6034e6b0c3a8adb106f15ccef52f9661ded03b108638c844c7e8fe806ccd98f895e2cc3ba5dc9b516bf9c6d41b88d0103cd7f7b3d0565b9ffdfa2331f890c81
-
Filesize
1.8MB
MD5b0bec3723324217c508755b97896f4e9
SHA1a16691727b4f92fe742ca41a625dc72f1bece904
SHA25633472f54cbc7e5e4a41cad3cf34a15d7f5d8f2253ce8a3ac037e8c02cfbaa01f
SHA512a6034e6b0c3a8adb106f15ccef52f9661ded03b108638c844c7e8fe806ccd98f895e2cc3ba5dc9b516bf9c6d41b88d0103cd7f7b3d0565b9ffdfa2331f890c81