Analysis
-
max time kernel
50s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2022, 17:51
Static task
static1
General
-
Target
946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe
-
Size
1.8MB
-
MD5
a7f19e3aad0386bbcc5eaeee9ba66546
-
SHA1
107174c9edc6889b5e3880f4c8309ed35d6b2003
-
SHA256
946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e
-
SHA512
19b2f9f2b0bc898773522d2ff76b0c4798cacf6c3cc7fca11f71f2c97f9c81dd439b7a50fa97d3e50554be78734d2516ff21676cd026054f74e5944f48733501
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 4344 oobeldr.exe 4344 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 4932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 4344 oobeldr.exe 4344 oobeldr.exe 4344 oobeldr.exe 4344 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4828 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 66 PID 2196 wrote to memory of 4828 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 66 PID 2196 wrote to memory of 4828 2196 946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe 66 PID 4344 wrote to memory of 4932 4344 oobeldr.exe 69 PID 4344 wrote to memory of 4932 4344 oobeldr.exe 69 PID 4344 wrote to memory of 4932 4344 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe"C:\Users\Admin\AppData\Local\Temp\946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a7f19e3aad0386bbcc5eaeee9ba66546
SHA1107174c9edc6889b5e3880f4c8309ed35d6b2003
SHA256946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e
SHA51219b2f9f2b0bc898773522d2ff76b0c4798cacf6c3cc7fca11f71f2c97f9c81dd439b7a50fa97d3e50554be78734d2516ff21676cd026054f74e5944f48733501
-
Filesize
1.8MB
MD5a7f19e3aad0386bbcc5eaeee9ba66546
SHA1107174c9edc6889b5e3880f4c8309ed35d6b2003
SHA256946a90271092f0d4e243a5284d5368c72b31f23f287250baead96c9bdb80724e
SHA51219b2f9f2b0bc898773522d2ff76b0c4798cacf6c3cc7fca11f71f2c97f9c81dd439b7a50fa97d3e50554be78734d2516ff21676cd026054f74e5944f48733501