Analysis
-
max time kernel
62s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2022 07:34
Static task
static1
General
-
Target
abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe
-
Size
1.8MB
-
MD5
d4fcee593d522e88d98b31265cc082f2
-
SHA1
31e3f461b05da9efa06c603a7dabe2f384b95348
-
SHA256
abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864
-
SHA512
717fe72f5161ed294a21cdbbbe7b0023434f5b722e1fdf57c373a7e70f5edade2a2e3461ef353a153a2cf39db5017ba5e53919eaf7abd66f2c29fa0d61abd8f3
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 316 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 316 oobeldr.exe 316 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2504 schtasks.exe 5028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 316 oobeldr.exe 316 oobeldr.exe 316 oobeldr.exe 316 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5104 wrote to memory of 5028 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 81 PID 5104 wrote to memory of 5028 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 81 PID 5104 wrote to memory of 5028 5104 abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe 81 PID 316 wrote to memory of 2504 316 oobeldr.exe 91 PID 316 wrote to memory of 2504 316 oobeldr.exe 91 PID 316 wrote to memory of 2504 316 oobeldr.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe"C:\Users\Admin\AppData\Local\Temp\abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5028
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5d4fcee593d522e88d98b31265cc082f2
SHA131e3f461b05da9efa06c603a7dabe2f384b95348
SHA256abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864
SHA512717fe72f5161ed294a21cdbbbe7b0023434f5b722e1fdf57c373a7e70f5edade2a2e3461ef353a153a2cf39db5017ba5e53919eaf7abd66f2c29fa0d61abd8f3
-
Filesize
1.8MB
MD5d4fcee593d522e88d98b31265cc082f2
SHA131e3f461b05da9efa06c603a7dabe2f384b95348
SHA256abecda34eb93889765d75fbc3be1932c6c229bc2a3819ca9575624836add3864
SHA512717fe72f5161ed294a21cdbbbe7b0023434f5b722e1fdf57c373a7e70f5edade2a2e3461ef353a153a2cf39db5017ba5e53919eaf7abd66f2c29fa0d61abd8f3