Analysis
-
max time kernel
53s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 19:14
Static task
static1
General
-
Target
810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe
-
Size
1.8MB
-
MD5
84365364ae7a98747d22fd9894dd1a77
-
SHA1
307bdf9d8c9bafebe4301b197efe09aa1511fa64
-
SHA256
810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110
-
SHA512
f095099462d422ba9bc70a982303f686ea25bbdd0044bbe5d92a6fb3f11a7b32092db1eec3cde17da4bf080fb9b52db06d871e85dd1dabf94c2843deb9d85f03
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe -
Executes dropped EXE 1 IoCs
pid Process 4744 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 4744 oobeldr.exe 4744 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1932 schtasks.exe 4924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 4744 oobeldr.exe 4744 oobeldr.exe 4744 oobeldr.exe 4744 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2832 wrote to memory of 1932 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 66 PID 2832 wrote to memory of 1932 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 66 PID 2832 wrote to memory of 1932 2832 810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe 66 PID 4744 wrote to memory of 4924 4744 oobeldr.exe 69 PID 4744 wrote to memory of 4924 4744 oobeldr.exe 69 PID 4744 wrote to memory of 4924 4744 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe"C:\Users\Admin\AppData\Local\Temp\810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1932
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD584365364ae7a98747d22fd9894dd1a77
SHA1307bdf9d8c9bafebe4301b197efe09aa1511fa64
SHA256810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110
SHA512f095099462d422ba9bc70a982303f686ea25bbdd0044bbe5d92a6fb3f11a7b32092db1eec3cde17da4bf080fb9b52db06d871e85dd1dabf94c2843deb9d85f03
-
Filesize
1.8MB
MD584365364ae7a98747d22fd9894dd1a77
SHA1307bdf9d8c9bafebe4301b197efe09aa1511fa64
SHA256810bcb822ea9780bb06bc7c0bc6d3880ea722bc22a33e64d49b628ffec8ce110
SHA512f095099462d422ba9bc70a982303f686ea25bbdd0044bbe5d92a6fb3f11a7b32092db1eec3cde17da4bf080fb9b52db06d871e85dd1dabf94c2843deb9d85f03