Analysis
-
max time kernel
50s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
17/09/2022, 00:08
Static task
static1
General
-
Target
4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe
-
Size
1.8MB
-
MD5
5782a2eebbe543ecf16e47c59ac57dc3
-
SHA1
27c6eb8c1f8d49012e102d83882188f1db119e6e
-
SHA256
4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee
-
SHA512
7c87acf8494bcc39f2e9a50558c0e628cbd2ef73c74ce60371f9c3b642bbdf04cdca71fae7f42609403dbc1dff8f84224858ba4d47692fb5ae8a170d8ff56f23
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe -
Executes dropped EXE 1 IoCs
pid Process 3336 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 3336 oobeldr.exe 3336 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3560 schtasks.exe 776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 3336 oobeldr.exe 3336 oobeldr.exe 3336 oobeldr.exe 3336 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3560 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 66 PID 2744 wrote to memory of 3560 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 66 PID 2744 wrote to memory of 3560 2744 4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe 66 PID 3336 wrote to memory of 776 3336 oobeldr.exe 69 PID 3336 wrote to memory of 776 3336 oobeldr.exe 69 PID 3336 wrote to memory of 776 3336 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe"C:\Users\Admin\AppData\Local\Temp\4d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3560
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55782a2eebbe543ecf16e47c59ac57dc3
SHA127c6eb8c1f8d49012e102d83882188f1db119e6e
SHA2564d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee
SHA5127c87acf8494bcc39f2e9a50558c0e628cbd2ef73c74ce60371f9c3b642bbdf04cdca71fae7f42609403dbc1dff8f84224858ba4d47692fb5ae8a170d8ff56f23
-
Filesize
1.8MB
MD55782a2eebbe543ecf16e47c59ac57dc3
SHA127c6eb8c1f8d49012e102d83882188f1db119e6e
SHA2564d7704e821b371461de0fb1b61c1d9e44e89d585b81ba88730fe1061612bccee
SHA5127c87acf8494bcc39f2e9a50558c0e628cbd2ef73c74ce60371f9c3b642bbdf04cdca71fae7f42609403dbc1dff8f84224858ba4d47692fb5ae8a170d8ff56f23