Analysis
-
max time kernel
78s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24-09-2022 12:38
Static task
static1
General
-
Target
bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe
-
Size
1.8MB
-
MD5
8f65f6d762bfd9649694511a2eb14506
-
SHA1
966c272441eae5c8b3f91282b5066fed07f694b1
-
SHA256
bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41
-
SHA512
8f6c82bff11d700bbe8942c383b85c0d2f1ea4497a75630f1d93734c920b8010b78164d3ba27d9ea7b62f0a1ffcbd00692cf49fc6a804ff29486fdc245dd2181
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2004 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 2004 oobeldr.exe 2004 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4376 schtasks.exe 4908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 2004 oobeldr.exe 2004 oobeldr.exe 2004 oobeldr.exe 2004 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4376 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 66 PID 1928 wrote to memory of 4376 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 66 PID 1928 wrote to memory of 4376 1928 bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe 66 PID 2004 wrote to memory of 4908 2004 oobeldr.exe 69 PID 2004 wrote to memory of 4908 2004 oobeldr.exe 69 PID 2004 wrote to memory of 4908 2004 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe"C:\Users\Admin\AppData\Local\Temp\bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4376
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58f65f6d762bfd9649694511a2eb14506
SHA1966c272441eae5c8b3f91282b5066fed07f694b1
SHA256bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41
SHA5128f6c82bff11d700bbe8942c383b85c0d2f1ea4497a75630f1d93734c920b8010b78164d3ba27d9ea7b62f0a1ffcbd00692cf49fc6a804ff29486fdc245dd2181
-
Filesize
1.8MB
MD58f65f6d762bfd9649694511a2eb14506
SHA1966c272441eae5c8b3f91282b5066fed07f694b1
SHA256bc67cf17d5da7aeee744e165ee2fb777512f4eb048528f90e66c06bfd26d8d41
SHA5128f6c82bff11d700bbe8942c383b85c0d2f1ea4497a75630f1d93734c920b8010b78164d3ba27d9ea7b62f0a1ffcbd00692cf49fc6a804ff29486fdc245dd2181