Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 04:09
Static task
static1
General
-
Target
a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe
-
Size
1.8MB
-
MD5
244d9c001434b59168d51d2349a87d1a
-
SHA1
a5baff220adddb98da11715830fea41e729c87bf
-
SHA256
a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7
-
SHA512
a466b39d1ec75cad12f1eef7ce65f8041eb3febae05a08a73d53b113cdcc54a6a951c4975164bb13c6d2b0fbcdd91c972c129c9b2ea67d3a2adc459b23506c35
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 708 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 708 oobeldr.exe 708 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4108 schtasks.exe 1204 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 708 oobeldr.exe 708 oobeldr.exe 708 oobeldr.exe 708 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1580 wrote to memory of 4108 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 82 PID 1580 wrote to memory of 4108 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 82 PID 1580 wrote to memory of 4108 1580 a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe 82 PID 708 wrote to memory of 1204 708 oobeldr.exe 85 PID 708 wrote to memory of 1204 708 oobeldr.exe 85 PID 708 wrote to memory of 1204 708 oobeldr.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe"C:\Users\Admin\AppData\Local\Temp\a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4108
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5244d9c001434b59168d51d2349a87d1a
SHA1a5baff220adddb98da11715830fea41e729c87bf
SHA256a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7
SHA512a466b39d1ec75cad12f1eef7ce65f8041eb3febae05a08a73d53b113cdcc54a6a951c4975164bb13c6d2b0fbcdd91c972c129c9b2ea67d3a2adc459b23506c35
-
Filesize
1.8MB
MD5244d9c001434b59168d51d2349a87d1a
SHA1a5baff220adddb98da11715830fea41e729c87bf
SHA256a5ab400e5f2bf583acdf409e25ec436752385f3ff9ed5953302ef3f0a0b5c5b7
SHA512a466b39d1ec75cad12f1eef7ce65f8041eb3febae05a08a73d53b113cdcc54a6a951c4975164bb13c6d2b0fbcdd91c972c129c9b2ea67d3a2adc459b23506c35