Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2022 01:12
Static task
static1
General
-
Target
11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe
-
Size
1.8MB
-
MD5
12ccf4bfa8a6917d8fea0f001947251b
-
SHA1
827c0ab37d0f1ae37e140756194709a8b5c6a0f5
-
SHA256
11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89
-
SHA512
e0b63277e196d0f76f9429ee1075237d75c519481110986a4f98504c418f9ba390c0d4d452c9befd5bd2c7f29f3d2ba587eb0fb37a6a51b00cafd0b62e27ec82
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2128 oobeldr.exe 2128 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4136 schtasks.exe 1832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 2128 oobeldr.exe 2128 oobeldr.exe 2128 oobeldr.exe 2128 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4136 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 84 PID 2008 wrote to memory of 4136 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 84 PID 2008 wrote to memory of 4136 2008 11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe 84 PID 2128 wrote to memory of 1832 2128 oobeldr.exe 96 PID 2128 wrote to memory of 1832 2128 oobeldr.exe 96 PID 2128 wrote to memory of 1832 2128 oobeldr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe"C:\Users\Admin\AppData\Local\Temp\11eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4136
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD512ccf4bfa8a6917d8fea0f001947251b
SHA1827c0ab37d0f1ae37e140756194709a8b5c6a0f5
SHA25611eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89
SHA512e0b63277e196d0f76f9429ee1075237d75c519481110986a4f98504c418f9ba390c0d4d452c9befd5bd2c7f29f3d2ba587eb0fb37a6a51b00cafd0b62e27ec82
-
Filesize
1.8MB
MD512ccf4bfa8a6917d8fea0f001947251b
SHA1827c0ab37d0f1ae37e140756194709a8b5c6a0f5
SHA25611eee5f2ffbdd3b080f11b90e3ab186a0b2c7f318f55b4cb32fe2f137a469c89
SHA512e0b63277e196d0f76f9429ee1075237d75c519481110986a4f98504c418f9ba390c0d4d452c9befd5bd2c7f29f3d2ba587eb0fb37a6a51b00cafd0b62e27ec82