Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 10:45
Static task
static1
General
-
Target
9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe
-
Size
1.8MB
-
MD5
261e899ad074c8ac00c8a88959420396
-
SHA1
f58cb960cdab7bd1bcc10290a3129675f2df133f
-
SHA256
9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24
-
SHA512
bcad518d14b3f04427ebdfa786af85fdb5201ceb6983e420c0139700a1ee13d6d017b0363c7cccc42725b6afaf204388be9601083f8449cd7b6bfaf9cdc63ec4
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3440 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 3440 oobeldr.exe 3440 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe 1264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 3440 oobeldr.exe 3440 oobeldr.exe 3440 oobeldr.exe 3440 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4976 wrote to memory of 1380 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 79 PID 4976 wrote to memory of 1380 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 79 PID 4976 wrote to memory of 1380 4976 9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe 79 PID 3440 wrote to memory of 1264 3440 oobeldr.exe 89 PID 3440 wrote to memory of 1264 3440 oobeldr.exe 89 PID 3440 wrote to memory of 1264 3440 oobeldr.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe"C:\Users\Admin\AppData\Local\Temp\9bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1264
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5261e899ad074c8ac00c8a88959420396
SHA1f58cb960cdab7bd1bcc10290a3129675f2df133f
SHA2569bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24
SHA512bcad518d14b3f04427ebdfa786af85fdb5201ceb6983e420c0139700a1ee13d6d017b0363c7cccc42725b6afaf204388be9601083f8449cd7b6bfaf9cdc63ec4
-
Filesize
1.8MB
MD5261e899ad074c8ac00c8a88959420396
SHA1f58cb960cdab7bd1bcc10290a3129675f2df133f
SHA2569bb129ce4f9b961e5d1bb0e1cc66d4f4aec9c2e5b2abc01b094c507f780a8f24
SHA512bcad518d14b3f04427ebdfa786af85fdb5201ceb6983e420c0139700a1ee13d6d017b0363c7cccc42725b6afaf204388be9601083f8449cd7b6bfaf9cdc63ec4