Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/09/2022, 20:37
Static task
static1
General
-
Target
681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe
-
Size
1.8MB
-
MD5
ef30f92ce3876aae52f65ba372752e50
-
SHA1
a69c199cac35440e97f1749526c2fdb110d67176
-
SHA256
681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089
-
SHA512
1ac28593b4c98d5e1c8205afa7dfba33955afb9ca914f2051ac0f0dd509c585e64871207f8eb7b2946ee3f9fc1ed14545333ce8e9a6803fb4556a515c6df9242
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3676 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3676 oobeldr.exe 3676 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe 5048 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 3676 oobeldr.exe 3676 oobeldr.exe 3676 oobeldr.exe 3676 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3828 wrote to memory of 5048 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 66 PID 3828 wrote to memory of 5048 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 66 PID 3828 wrote to memory of 5048 3828 681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe 66 PID 3676 wrote to memory of 4520 3676 oobeldr.exe 69 PID 3676 wrote to memory of 4520 3676 oobeldr.exe 69 PID 3676 wrote to memory of 4520 3676 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe"C:\Users\Admin\AppData\Local\Temp\681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5048
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ef30f92ce3876aae52f65ba372752e50
SHA1a69c199cac35440e97f1749526c2fdb110d67176
SHA256681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089
SHA5121ac28593b4c98d5e1c8205afa7dfba33955afb9ca914f2051ac0f0dd509c585e64871207f8eb7b2946ee3f9fc1ed14545333ce8e9a6803fb4556a515c6df9242
-
Filesize
1.8MB
MD5ef30f92ce3876aae52f65ba372752e50
SHA1a69c199cac35440e97f1749526c2fdb110d67176
SHA256681085a7bf4faed3fe128305f9d5d43a89633db3506d0bf45377ea79772a4089
SHA5121ac28593b4c98d5e1c8205afa7dfba33955afb9ca914f2051ac0f0dd509c585e64871207f8eb7b2946ee3f9fc1ed14545333ce8e9a6803fb4556a515c6df9242