Analysis
-
max time kernel
79s -
max time network
55s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17/09/2022, 11:17
Static task
static1
General
-
Target
bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe
-
Size
1.8MB
-
MD5
dcd646ec629abac864fc5c48400cff85
-
SHA1
f67f26b44af0a75cd904e6794d4af1b76b60cc1c
-
SHA256
bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878
-
SHA512
69a009b7d35b3e04b14b4d459fa342621eab934d6bab994932896705170fa0e88a59377549ba448ce5cc0b5def4306e9b820319f32060dcc13db6ba4aeaf4242
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3140 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 3140 oobeldr.exe 3140 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1476 schtasks.exe 4920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 3140 oobeldr.exe 3140 oobeldr.exe 3140 oobeldr.exe 3140 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1476 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 66 PID 2100 wrote to memory of 1476 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 66 PID 2100 wrote to memory of 1476 2100 bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe 66 PID 3140 wrote to memory of 4920 3140 oobeldr.exe 69 PID 3140 wrote to memory of 4920 3140 oobeldr.exe 69 PID 3140 wrote to memory of 4920 3140 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe"C:\Users\Admin\AppData\Local\Temp\bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1476
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4920
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5dcd646ec629abac864fc5c48400cff85
SHA1f67f26b44af0a75cd904e6794d4af1b76b60cc1c
SHA256bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878
SHA51269a009b7d35b3e04b14b4d459fa342621eab934d6bab994932896705170fa0e88a59377549ba448ce5cc0b5def4306e9b820319f32060dcc13db6ba4aeaf4242
-
Filesize
1.8MB
MD5dcd646ec629abac864fc5c48400cff85
SHA1f67f26b44af0a75cd904e6794d4af1b76b60cc1c
SHA256bc6590706820a1494bf70c42400c3f0f1897402d1a106e1af22801fe737d6878
SHA51269a009b7d35b3e04b14b4d459fa342621eab934d6bab994932896705170fa0e88a59377549ba448ce5cc0b5def4306e9b820319f32060dcc13db6ba4aeaf4242