Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2022 10:21
Static task
static1
General
-
Target
8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe
-
Size
1.8MB
-
MD5
6a59fce1a26306f3033b5452069646e5
-
SHA1
7aa4b8bbef28f946549cbbb261ef253e2c5c2661
-
SHA256
8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a
-
SHA512
d15f3cd8af7339ea9a76e6b3f38dfb2e045ad45c496dca536d98b5600fe273a7e823d7933bcd4474c928716e60ef7aedb5de54c1228cd3972ad9787884d911c4
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 4936 oobeldr.exe 4936 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3068 schtasks.exe 4144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 4936 oobeldr.exe 4936 oobeldr.exe 4936 oobeldr.exe 4936 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3068 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 80 PID 2620 wrote to memory of 3068 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 80 PID 2620 wrote to memory of 3068 2620 8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe 80 PID 4936 wrote to memory of 4144 4936 oobeldr.exe 89 PID 4936 wrote to memory of 4144 4936 oobeldr.exe 89 PID 4936 wrote to memory of 4144 4936 oobeldr.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe"C:\Users\Admin\AppData\Local\Temp\8159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56a59fce1a26306f3033b5452069646e5
SHA17aa4b8bbef28f946549cbbb261ef253e2c5c2661
SHA2568159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a
SHA512d15f3cd8af7339ea9a76e6b3f38dfb2e045ad45c496dca536d98b5600fe273a7e823d7933bcd4474c928716e60ef7aedb5de54c1228cd3972ad9787884d911c4
-
Filesize
1.8MB
MD56a59fce1a26306f3033b5452069646e5
SHA17aa4b8bbef28f946549cbbb261ef253e2c5c2661
SHA2568159924a7932b4b741b6ab0bf0b051461ee95b150dfc34897ba208290984f83a
SHA512d15f3cd8af7339ea9a76e6b3f38dfb2e045ad45c496dca536d98b5600fe273a7e823d7933bcd4474c928716e60ef7aedb5de54c1228cd3972ad9787884d911c4