Analysis

  • max time kernel
    55s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2022 06:15

General

  • Target

    e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf.exe

  • Size

    1.8MB

  • MD5

    f073355c0b651cab68bf79cb2920916b

  • SHA1

    5a2b4be347837b8190461a660dd6b5f065738e1b

  • SHA256

    e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf

  • SHA512

    d2a7f97df3f6edc95a3fa3e373cc87479832a773fb9206655f76604f87b476433f34e7b31503d636e83b26afa06628eab8639fb8da372b1f2dc8c78334d309db

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf.exe
    "C:\Users\Admin\AppData\Local\Temp\e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2412
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4348
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
      2⤵
      • Creates scheduled task(s)
      PID:740

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    1.8MB

    MD5

    f073355c0b651cab68bf79cb2920916b

    SHA1

    5a2b4be347837b8190461a660dd6b5f065738e1b

    SHA256

    e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf

    SHA512

    d2a7f97df3f6edc95a3fa3e373cc87479832a773fb9206655f76604f87b476433f34e7b31503d636e83b26afa06628eab8639fb8da372b1f2dc8c78334d309db

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    1.8MB

    MD5

    f073355c0b651cab68bf79cb2920916b

    SHA1

    5a2b4be347837b8190461a660dd6b5f065738e1b

    SHA256

    e95eeb59c137e73ae308b3e00792e3e2565819dcfce0747156a5ba71fdf126cf

    SHA512

    d2a7f97df3f6edc95a3fa3e373cc87479832a773fb9206655f76604f87b476433f34e7b31503d636e83b26afa06628eab8639fb8da372b1f2dc8c78334d309db

  • memory/740-147-0x0000000000000000-mapping.dmp
  • memory/960-137-0x00000000009C1000-0x00000000009C3000-memory.dmp
    Filesize

    8KB

  • memory/960-134-0x0000000002D20000-0x0000000002D64000-memory.dmp
    Filesize

    272KB

  • memory/960-132-0x00000000009C0000-0x0000000000CDF000-memory.dmp
    Filesize

    3.1MB

  • memory/960-139-0x00000000009C0000-0x0000000000CDF000-memory.dmp
    Filesize

    3.1MB

  • memory/960-140-0x0000000002D20000-0x0000000002D64000-memory.dmp
    Filesize

    272KB

  • memory/960-141-0x0000000077190000-0x0000000077333000-memory.dmp
    Filesize

    1.6MB

  • memory/960-135-0x00000000009C0000-0x0000000000CDF000-memory.dmp
    Filesize

    3.1MB

  • memory/960-133-0x00000000009C0000-0x0000000000CDF000-memory.dmp
    Filesize

    3.1MB

  • memory/960-136-0x00000000009C1000-0x00000000009C3000-memory.dmp
    Filesize

    8KB

  • memory/2412-138-0x0000000000000000-mapping.dmp
  • memory/4348-144-0x0000000000490000-0x00000000007AF000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-146-0x0000000000491000-0x0000000000493000-memory.dmp
    Filesize

    8KB

  • memory/4348-148-0x0000000000490000-0x00000000007AF000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-149-0x00000000012C0000-0x0000000001304000-memory.dmp
    Filesize

    272KB

  • memory/4348-150-0x0000000000490000-0x00000000007AF000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-151-0x0000000077190000-0x0000000077333000-memory.dmp
    Filesize

    1.6MB

  • memory/4348-152-0x0000000000490000-0x00000000007AF000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-153-0x00000000012C0000-0x0000000001304000-memory.dmp
    Filesize

    272KB