Analysis
-
max time kernel
76s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14-09-2022 20:47
Static task
static1
General
-
Target
6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe
-
Size
1.8MB
-
MD5
9643795fcb0fa7a609d7b0f1ae2b7c8b
-
SHA1
a142b0ae893e624e10abb03962a1179525b42c2b
-
SHA256
6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b
-
SHA512
b9951e9ebbf14688284768c0e10bf982aa1465a7c98284a50318f59b1ff8620227eb05475aafe139751a3a83f6bc807bdd2695811bbe06395b12af5a66ef89ef
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3608 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 3608 oobeldr.exe 3608 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4080 schtasks.exe 3336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 3608 oobeldr.exe 3608 oobeldr.exe 3608 oobeldr.exe 3608 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4080 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 66 PID 2124 wrote to memory of 4080 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 66 PID 2124 wrote to memory of 4080 2124 6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe 66 PID 3608 wrote to memory of 3336 3608 oobeldr.exe 69 PID 3608 wrote to memory of 3336 3608 oobeldr.exe 69 PID 3608 wrote to memory of 3336 3608 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe"C:\Users\Admin\AppData\Local\Temp\6902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4080
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59643795fcb0fa7a609d7b0f1ae2b7c8b
SHA1a142b0ae893e624e10abb03962a1179525b42c2b
SHA2566902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b
SHA512b9951e9ebbf14688284768c0e10bf982aa1465a7c98284a50318f59b1ff8620227eb05475aafe139751a3a83f6bc807bdd2695811bbe06395b12af5a66ef89ef
-
Filesize
1.8MB
MD59643795fcb0fa7a609d7b0f1ae2b7c8b
SHA1a142b0ae893e624e10abb03962a1179525b42c2b
SHA2566902c8b87d2acfec02553929218612c8aa1916313098e641362d8f689bf27e3b
SHA512b9951e9ebbf14688284768c0e10bf982aa1465a7c98284a50318f59b1ff8620227eb05475aafe139751a3a83f6bc807bdd2695811bbe06395b12af5a66ef89ef