Analysis
-
max time kernel
49s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23/09/2022, 04:26
Static task
static1
General
-
Target
fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe
-
Size
1.8MB
-
MD5
e328ad036dbe984e676e5ab9929715b8
-
SHA1
bd6c024f8fde847b173e85a67be46a41f92972da
-
SHA256
fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03
-
SHA512
1a690e78c105ca05ac903c54cf7f95c8ab6a75464bac1b752be1ea926fb574bfb72567e53b0f2405ac7cb869d82f08a151a3c196150fcfcf83e8c3ec465ba7ec
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1324 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 1324 oobeldr.exe 1324 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2188 schtasks.exe 4024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 1324 oobeldr.exe 1324 oobeldr.exe 1324 oobeldr.exe 1324 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 328 wrote to memory of 2188 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 66 PID 328 wrote to memory of 2188 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 66 PID 328 wrote to memory of 2188 328 fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe 66 PID 1324 wrote to memory of 4024 1324 oobeldr.exe 69 PID 1324 wrote to memory of 4024 1324 oobeldr.exe 69 PID 1324 wrote to memory of 4024 1324 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe"C:\Users\Admin\AppData\Local\Temp\fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2188
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4024
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e328ad036dbe984e676e5ab9929715b8
SHA1bd6c024f8fde847b173e85a67be46a41f92972da
SHA256fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03
SHA5121a690e78c105ca05ac903c54cf7f95c8ab6a75464bac1b752be1ea926fb574bfb72567e53b0f2405ac7cb869d82f08a151a3c196150fcfcf83e8c3ec465ba7ec
-
Filesize
1.8MB
MD5e328ad036dbe984e676e5ab9929715b8
SHA1bd6c024f8fde847b173e85a67be46a41f92972da
SHA256fce35a04716d7de10fba436f68f0dacd36f94f574c560fb52b3d710ae8d24c03
SHA5121a690e78c105ca05ac903c54cf7f95c8ab6a75464bac1b752be1ea926fb574bfb72567e53b0f2405ac7cb869d82f08a151a3c196150fcfcf83e8c3ec465ba7ec