Analysis
-
max time kernel
55s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 15:51
Static task
static1
General
-
Target
4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe
-
Size
1.8MB
-
MD5
2e749aff6b6fc716b881529643135c54
-
SHA1
935d8b29422f34d4684b6f178ae73827b88f26c9
-
SHA256
4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df
-
SHA512
31ea5751eb455f741a1dfa5b9769f3885edc69346ccf5c84db03d3a3030e3c56638ce1cbda543f66b7669274cd3ec7eb105673085eab84fd76012dd2e19832fb
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4656 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 4656 oobeldr.exe 4656 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4408 schtasks.exe 4180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 4656 oobeldr.exe 4656 oobeldr.exe 4656 oobeldr.exe 4656 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4408 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 66 PID 1524 wrote to memory of 4408 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 66 PID 1524 wrote to memory of 4408 1524 4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe 66 PID 4656 wrote to memory of 4180 4656 oobeldr.exe 69 PID 4656 wrote to memory of 4180 4656 oobeldr.exe 69 PID 4656 wrote to memory of 4180 4656 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe"C:\Users\Admin\AppData\Local\Temp\4ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4408
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4180
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52e749aff6b6fc716b881529643135c54
SHA1935d8b29422f34d4684b6f178ae73827b88f26c9
SHA2564ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df
SHA51231ea5751eb455f741a1dfa5b9769f3885edc69346ccf5c84db03d3a3030e3c56638ce1cbda543f66b7669274cd3ec7eb105673085eab84fd76012dd2e19832fb
-
Filesize
1.8MB
MD52e749aff6b6fc716b881529643135c54
SHA1935d8b29422f34d4684b6f178ae73827b88f26c9
SHA2564ad1309f90d93531ccdd6c32ae808d674d68434fba1e693981ddaecc7d4c57df
SHA51231ea5751eb455f741a1dfa5b9769f3885edc69346ccf5c84db03d3a3030e3c56638ce1cbda543f66b7669274cd3ec7eb105673085eab84fd76012dd2e19832fb