Analysis
-
max time kernel
77s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2022, 12:25
Static task
static1
General
-
Target
58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe
-
Size
1.8MB
-
MD5
77438fd907d264838d6b440897c9f603
-
SHA1
35be322aa574bce7f33cf3e2de0b73d11dfd25d9
-
SHA256
58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7
-
SHA512
3a9bbbd61cc25bfc46020215ded7284f9bba4986c6ca197aba5423854450b172f8843a1412633963e0ff3e931699491956d58e1cc0070480740189005db41aa3
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 4712 oobeldr.exe 4712 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4860 schtasks.exe 3916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 4712 oobeldr.exe 4712 oobeldr.exe 4712 oobeldr.exe 4712 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4860 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 86 PID 1096 wrote to memory of 4860 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 86 PID 1096 wrote to memory of 4860 1096 58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe 86 PID 4712 wrote to memory of 3916 4712 oobeldr.exe 95 PID 4712 wrote to memory of 3916 4712 oobeldr.exe 95 PID 4712 wrote to memory of 3916 4712 oobeldr.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe"C:\Users\Admin\AppData\Local\Temp\58284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4860
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3916
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD577438fd907d264838d6b440897c9f603
SHA135be322aa574bce7f33cf3e2de0b73d11dfd25d9
SHA25658284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7
SHA5123a9bbbd61cc25bfc46020215ded7284f9bba4986c6ca197aba5423854450b172f8843a1412633963e0ff3e931699491956d58e1cc0070480740189005db41aa3
-
Filesize
1.8MB
MD577438fd907d264838d6b440897c9f603
SHA135be322aa574bce7f33cf3e2de0b73d11dfd25d9
SHA25658284ef4212ed5cd4d7d15f9773432342e95fa9f5e7e7dddb45c3d4cd5e18bb7
SHA5123a9bbbd61cc25bfc46020215ded7284f9bba4986c6ca197aba5423854450b172f8843a1412633963e0ff3e931699491956d58e1cc0070480740189005db41aa3