Analysis
-
max time kernel
51s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 05:24
Static task
static1
General
-
Target
fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe
-
Size
1.8MB
-
MD5
70d1a5e225c9af7d81239c9d87d1de87
-
SHA1
ae74458f212b8cd2bce54a2795b6aefeb179515c
-
SHA256
fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d
-
SHA512
eaa92caf707381480e6c561ba28bd98ef2649deda6e7c0f012b3cf315eca9c2e4ae600460574e89f4a624c11c38fa4fbf953cb3a43843bc1b24cfe83a38fc678
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 4080 oobeldr.exe 4080 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3456 schtasks.exe 4828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 4080 oobeldr.exe 4080 oobeldr.exe 4080 oobeldr.exe 4080 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3456 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 66 PID 1760 wrote to memory of 3456 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 66 PID 1760 wrote to memory of 3456 1760 fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe 66 PID 4080 wrote to memory of 4828 4080 oobeldr.exe 69 PID 4080 wrote to memory of 4828 4080 oobeldr.exe 69 PID 4080 wrote to memory of 4828 4080 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe"C:\Users\Admin\AppData\Local\Temp\fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3456
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD570d1a5e225c9af7d81239c9d87d1de87
SHA1ae74458f212b8cd2bce54a2795b6aefeb179515c
SHA256fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d
SHA512eaa92caf707381480e6c561ba28bd98ef2649deda6e7c0f012b3cf315eca9c2e4ae600460574e89f4a624c11c38fa4fbf953cb3a43843bc1b24cfe83a38fc678
-
Filesize
1.8MB
MD570d1a5e225c9af7d81239c9d87d1de87
SHA1ae74458f212b8cd2bce54a2795b6aefeb179515c
SHA256fb9fa77ae7e6b1efb9db5429c7df447a5eb0cecfe8503a46b7a78aa9353a411d
SHA512eaa92caf707381480e6c561ba28bd98ef2649deda6e7c0f012b3cf315eca9c2e4ae600460574e89f4a624c11c38fa4fbf953cb3a43843bc1b24cfe83a38fc678