Analysis
-
max time kernel
52s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20-09-2022 10:38
Static task
static1
General
-
Target
ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe
-
Size
1.8MB
-
MD5
ef7126240031ac08d8e77f1377e671bb
-
SHA1
5c91857f207537e50f8bd3a34585bb72f75b1c58
-
SHA256
ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49
-
SHA512
3750eca2cadcf802cfbc68a27dabcff6f48086c7fc9eddd87962fe04b9d0f875617746e304ecedf184de678204718ce35c021f9be68c523d9492366cb17f64ae
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2892 oobeldr.exe 2892 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1416 schtasks.exe 4612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 2892 oobeldr.exe 2892 oobeldr.exe 2892 oobeldr.exe 2892 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1416 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 66 PID 2684 wrote to memory of 1416 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 66 PID 2684 wrote to memory of 1416 2684 ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe 66 PID 2892 wrote to memory of 4612 2892 oobeldr.exe 69 PID 2892 wrote to memory of 4612 2892 oobeldr.exe 69 PID 2892 wrote to memory of 4612 2892 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe"C:\Users\Admin\AppData\Local\Temp\ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1416
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4612
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ef7126240031ac08d8e77f1377e671bb
SHA15c91857f207537e50f8bd3a34585bb72f75b1c58
SHA256ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49
SHA5123750eca2cadcf802cfbc68a27dabcff6f48086c7fc9eddd87962fe04b9d0f875617746e304ecedf184de678204718ce35c021f9be68c523d9492366cb17f64ae
-
Filesize
1.8MB
MD5ef7126240031ac08d8e77f1377e671bb
SHA15c91857f207537e50f8bd3a34585bb72f75b1c58
SHA256ce9c06a667ee5620c58348c1184633cb8d7c1296f5964fd3e99684ae48009f49
SHA5123750eca2cadcf802cfbc68a27dabcff6f48086c7fc9eddd87962fe04b9d0f875617746e304ecedf184de678204718ce35c021f9be68c523d9492366cb17f64ae