Analysis
-
max time kernel
77s -
max time network
63s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
21-09-2022 06:34
Static task
static1
General
-
Target
a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe
-
Size
1.8MB
-
MD5
ebecaebe2e9f08b4ef69e408722ee56d
-
SHA1
3e9414e3d3f0e9b79c3b64ca215c2c5f4d27fd41
-
SHA256
a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777
-
SHA512
725b6b2dd3ba48ee4be149733e42cb9d0fdb617e5c74c2903fcf362e7c35332acae5ae8cb177b0da5a37644bcb35d6c93f1d51fbcc736ca845a1d57f6437e5dc
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4904 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 4904 oobeldr.exe 4904 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3388 schtasks.exe 5112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 4904 oobeldr.exe 4904 oobeldr.exe 4904 oobeldr.exe 4904 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3388 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 66 PID 2744 wrote to memory of 3388 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 66 PID 2744 wrote to memory of 3388 2744 a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe 66 PID 4904 wrote to memory of 5112 4904 oobeldr.exe 69 PID 4904 wrote to memory of 5112 4904 oobeldr.exe 69 PID 4904 wrote to memory of 5112 4904 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe"C:\Users\Admin\AppData\Local\Temp\a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3388
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ebecaebe2e9f08b4ef69e408722ee56d
SHA13e9414e3d3f0e9b79c3b64ca215c2c5f4d27fd41
SHA256a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777
SHA512725b6b2dd3ba48ee4be149733e42cb9d0fdb617e5c74c2903fcf362e7c35332acae5ae8cb177b0da5a37644bcb35d6c93f1d51fbcc736ca845a1d57f6437e5dc
-
Filesize
1.8MB
MD5ebecaebe2e9f08b4ef69e408722ee56d
SHA13e9414e3d3f0e9b79c3b64ca215c2c5f4d27fd41
SHA256a40bf228385e84b3888068cbfc57d1ee1bd481ff961e97fcfb9cdbc876c30777
SHA512725b6b2dd3ba48ee4be149733e42cb9d0fdb617e5c74c2903fcf362e7c35332acae5ae8cb177b0da5a37644bcb35d6c93f1d51fbcc736ca845a1d57f6437e5dc