Analysis
-
max time kernel
91s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2022 21:11
Static task
static1
General
-
Target
87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe
-
Size
1.8MB
-
MD5
ed0bb0680f68156dfa86a49cba942e1f
-
SHA1
a11b69f037ea9beed097dcf4885f486a5b8a8e45
-
SHA256
87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8
-
SHA512
371d52ce475e87e9b748276a6d415af76fc03c8398d3ae05cbcf24b1a8d9d4736640baeb5027f438c92c7d684ad9baad5e2943ae1e75072dca0e75b286a1d189
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe -
Executes dropped EXE 1 IoCs
pid Process 2748 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 2748 oobeldr.exe 2748 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe 4604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 2748 oobeldr.exe 2748 oobeldr.exe 2748 oobeldr.exe 2748 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3524 wrote to memory of 5044 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 79 PID 3524 wrote to memory of 5044 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 79 PID 3524 wrote to memory of 5044 3524 87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe 79 PID 2748 wrote to memory of 4604 2748 oobeldr.exe 89 PID 2748 wrote to memory of 4604 2748 oobeldr.exe 89 PID 2748 wrote to memory of 4604 2748 oobeldr.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe"C:\Users\Admin\AppData\Local\Temp\87606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5044
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4604
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ed0bb0680f68156dfa86a49cba942e1f
SHA1a11b69f037ea9beed097dcf4885f486a5b8a8e45
SHA25687606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8
SHA512371d52ce475e87e9b748276a6d415af76fc03c8398d3ae05cbcf24b1a8d9d4736640baeb5027f438c92c7d684ad9baad5e2943ae1e75072dca0e75b286a1d189
-
Filesize
1.8MB
MD5ed0bb0680f68156dfa86a49cba942e1f
SHA1a11b69f037ea9beed097dcf4885f486a5b8a8e45
SHA25687606d1b68c312c314f2344aad821f069d286becfb09aac7c8a5ccf2f013c9f8
SHA512371d52ce475e87e9b748276a6d415af76fc03c8398d3ae05cbcf24b1a8d9d4736640baeb5027f438c92c7d684ad9baad5e2943ae1e75072dca0e75b286a1d189