Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2022 15:58
Static task
static1
General
-
Target
259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe
-
Size
1.8MB
-
MD5
60b7ac91af5359628c497fc0d4172546
-
SHA1
6263b5a40aae227d06bf538ec773200af710fa14
-
SHA256
259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5
-
SHA512
6c94566d25f83b502885360517c5d557f94622f6155afff1a8202d93617ac0abb39eb984a11d499c4b8ee9e5a95d66c30a199b1f9ec99d0227d3912104170db3
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4528 oobeldr.exe 4528 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4292 schtasks.exe 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 4528 oobeldr.exe 4528 oobeldr.exe 4528 oobeldr.exe 4528 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4292 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 79 PID 4076 wrote to memory of 4292 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 79 PID 4076 wrote to memory of 4292 4076 259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe 79 PID 4528 wrote to memory of 2868 4528 oobeldr.exe 90 PID 4528 wrote to memory of 2868 4528 oobeldr.exe 90 PID 4528 wrote to memory of 2868 4528 oobeldr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe"C:\Users\Admin\AppData\Local\Temp\259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4292
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD560b7ac91af5359628c497fc0d4172546
SHA16263b5a40aae227d06bf538ec773200af710fa14
SHA256259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5
SHA5126c94566d25f83b502885360517c5d557f94622f6155afff1a8202d93617ac0abb39eb984a11d499c4b8ee9e5a95d66c30a199b1f9ec99d0227d3912104170db3
-
Filesize
1.8MB
MD560b7ac91af5359628c497fc0d4172546
SHA16263b5a40aae227d06bf538ec773200af710fa14
SHA256259f179c53869d4480e49ebb79c11bd4cc665b9cd77e83a9386539153db861e5
SHA5126c94566d25f83b502885360517c5d557f94622f6155afff1a8202d93617ac0abb39eb984a11d499c4b8ee9e5a95d66c30a199b1f9ec99d0227d3912104170db3