Analysis
-
max time kernel
72s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 23:03
Static task
static1
General
-
Target
bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe
-
Size
1.8MB
-
MD5
26f43ea18cc0bcae8d994e0c18ad9a1f
-
SHA1
5898e7408a719e4c023612f9be594d1ac9edf3da
-
SHA256
bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1
-
SHA512
1357536c6366b1ed956a7d84cc0a36062e3c93a51ca5812f12d142b5855c6e667dd46219daf96ddedb333719fc79476185dcfb21d61933b00a38370280f0609e
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4892 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 4892 oobeldr.exe 4892 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 968 schtasks.exe 3708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 4892 oobeldr.exe 4892 oobeldr.exe 4892 oobeldr.exe 4892 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 968 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 66 PID 2744 wrote to memory of 968 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 66 PID 2744 wrote to memory of 968 2744 bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe 66 PID 4892 wrote to memory of 3708 4892 oobeldr.exe 69 PID 4892 wrote to memory of 3708 4892 oobeldr.exe 69 PID 4892 wrote to memory of 3708 4892 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe"C:\Users\Admin\AppData\Local\Temp\bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:968
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD526f43ea18cc0bcae8d994e0c18ad9a1f
SHA15898e7408a719e4c023612f9be594d1ac9edf3da
SHA256bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1
SHA5121357536c6366b1ed956a7d84cc0a36062e3c93a51ca5812f12d142b5855c6e667dd46219daf96ddedb333719fc79476185dcfb21d61933b00a38370280f0609e
-
Filesize
1.8MB
MD526f43ea18cc0bcae8d994e0c18ad9a1f
SHA15898e7408a719e4c023612f9be594d1ac9edf3da
SHA256bccacdbf9ea2c1274bbec0e70ff0ab7409be377009d55819723b51532dfb89f1
SHA5121357536c6366b1ed956a7d84cc0a36062e3c93a51ca5812f12d142b5855c6e667dd46219daf96ddedb333719fc79476185dcfb21d61933b00a38370280f0609e