Analysis
-
max time kernel
51s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24/09/2022, 14:28
Static task
static1
General
-
Target
d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe
-
Size
1.8MB
-
MD5
0b016634bf530ffdd77ab40ae07a30eb
-
SHA1
9f2d33e821ef7ca050044a0ad4c6d8bc2376d038
-
SHA256
d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275
-
SHA512
e2331351f88a8f9a356d8a833c82d4253c9a81fc8ed34319aa705931db7563844046b5d1924f9b77f2e9fe6cdf90debc1315bedcf6a9428aba0b5e7235539360
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4460 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 4460 oobeldr.exe 4460 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4332 schtasks.exe 1592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 4460 oobeldr.exe 4460 oobeldr.exe 4460 oobeldr.exe 4460 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2188 wrote to memory of 4332 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 66 PID 2188 wrote to memory of 4332 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 66 PID 2188 wrote to memory of 4332 2188 d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe 66 PID 4460 wrote to memory of 1592 4460 oobeldr.exe 69 PID 4460 wrote to memory of 1592 4460 oobeldr.exe 69 PID 4460 wrote to memory of 1592 4460 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe"C:\Users\Admin\AppData\Local\Temp\d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50b016634bf530ffdd77ab40ae07a30eb
SHA19f2d33e821ef7ca050044a0ad4c6d8bc2376d038
SHA256d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275
SHA512e2331351f88a8f9a356d8a833c82d4253c9a81fc8ed34319aa705931db7563844046b5d1924f9b77f2e9fe6cdf90debc1315bedcf6a9428aba0b5e7235539360
-
Filesize
1.8MB
MD50b016634bf530ffdd77ab40ae07a30eb
SHA19f2d33e821ef7ca050044a0ad4c6d8bc2376d038
SHA256d0f530f64624983d8768e613d0f3510fe5507c481f73546ee0cf2b91dc1d9275
SHA512e2331351f88a8f9a356d8a833c82d4253c9a81fc8ed34319aa705931db7563844046b5d1924f9b77f2e9fe6cdf90debc1315bedcf6a9428aba0b5e7235539360