Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 15:05
Static task
static1
General
-
Target
c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe
-
Size
1.8MB
-
MD5
800be1caa649a5129655528022b23ac2
-
SHA1
cec8373f19fe78f8fdde1b83312dce2f68323cef
-
SHA256
c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8
-
SHA512
b83feaabc003c6220c28bb554dddec5f6c9a11618a8882449ae13e7733cea38cf9cb1989441c693685ba7dd0bfc1a3564b44c7ce5f0467ab052a47bb44359771
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 1068 oobeldr.exe 1068 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4712 schtasks.exe 4920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 1068 oobeldr.exe 1068 oobeldr.exe 1068 oobeldr.exe 1068 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4712 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 66 PID 4036 wrote to memory of 4712 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 66 PID 4036 wrote to memory of 4712 4036 c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe 66 PID 1068 wrote to memory of 4920 1068 oobeldr.exe 69 PID 1068 wrote to memory of 4920 1068 oobeldr.exe 69 PID 1068 wrote to memory of 4920 1068 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe"C:\Users\Admin\AppData\Local\Temp\c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4712
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5800be1caa649a5129655528022b23ac2
SHA1cec8373f19fe78f8fdde1b83312dce2f68323cef
SHA256c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8
SHA512b83feaabc003c6220c28bb554dddec5f6c9a11618a8882449ae13e7733cea38cf9cb1989441c693685ba7dd0bfc1a3564b44c7ce5f0467ab052a47bb44359771
-
Filesize
1.8MB
MD5800be1caa649a5129655528022b23ac2
SHA1cec8373f19fe78f8fdde1b83312dce2f68323cef
SHA256c6d47a7240b887bf29305cfaf589430961f9d60f12d4bce5d28e0cc903d4b1d8
SHA512b83feaabc003c6220c28bb554dddec5f6c9a11618a8882449ae13e7733cea38cf9cb1989441c693685ba7dd0bfc1a3564b44c7ce5f0467ab052a47bb44359771