Analysis
-
max time kernel
53s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2022, 15:04
Static task
static1
General
-
Target
4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe
-
Size
1.8MB
-
MD5
a964f542e076c2dae797251dfc934f51
-
SHA1
932077fbe5198af44813a650df923155a83f4324
-
SHA256
4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97
-
SHA512
ecc8743796856688edfd16ae3a8ee5b03b745774762e615b0ce07a84df3556f37c9d69e323b5e3cd593d422df61c7493268e254d36b8054a007656357d91a52b
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4900 oobeldr.exe 4900 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1144 schtasks.exe 4132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 4900 oobeldr.exe 4900 oobeldr.exe 4900 oobeldr.exe 4900 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4528 wrote to memory of 1144 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 66 PID 4528 wrote to memory of 1144 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 66 PID 4528 wrote to memory of 1144 4528 4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe 66 PID 4900 wrote to memory of 4132 4900 oobeldr.exe 69 PID 4900 wrote to memory of 4132 4900 oobeldr.exe 69 PID 4900 wrote to memory of 4132 4900 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe"C:\Users\Admin\AppData\Local\Temp\4219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1144
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a964f542e076c2dae797251dfc934f51
SHA1932077fbe5198af44813a650df923155a83f4324
SHA2564219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97
SHA512ecc8743796856688edfd16ae3a8ee5b03b745774762e615b0ce07a84df3556f37c9d69e323b5e3cd593d422df61c7493268e254d36b8054a007656357d91a52b
-
Filesize
1.8MB
MD5a964f542e076c2dae797251dfc934f51
SHA1932077fbe5198af44813a650df923155a83f4324
SHA2564219c90248a355a03c70d98be7cd27e7660823dfe2fb2770824ed66c10becf97
SHA512ecc8743796856688edfd16ae3a8ee5b03b745774762e615b0ce07a84df3556f37c9d69e323b5e3cd593d422df61c7493268e254d36b8054a007656357d91a52b