Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2022, 20:08
Static task
static1
General
-
Target
1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe
-
Size
1.8MB
-
MD5
696dcb33adf8702bef554833fe8defae
-
SHA1
d4055ac6ce85b12310f25c718b93677f919866e0
-
SHA256
1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2
-
SHA512
27bfed81e9837fe3b83d863b0c1620993687b048f66e62cc07dd7fa333c494659ded50a860ae1bbcd7d6dd2d268711eb421ee9db384d023b1b440794dd55e278
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1080 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 1080 oobeldr.exe 1080 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3904 schtasks.exe 4796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 1080 oobeldr.exe 1080 oobeldr.exe 1080 oobeldr.exe 1080 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4796 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 84 PID 3124 wrote to memory of 4796 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 84 PID 3124 wrote to memory of 4796 3124 1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe 84 PID 1080 wrote to memory of 3904 1080 oobeldr.exe 101 PID 1080 wrote to memory of 3904 1080 oobeldr.exe 101 PID 1080 wrote to memory of 3904 1080 oobeldr.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe"C:\Users\Admin\AppData\Local\Temp\1da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4796
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5696dcb33adf8702bef554833fe8defae
SHA1d4055ac6ce85b12310f25c718b93677f919866e0
SHA2561da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2
SHA51227bfed81e9837fe3b83d863b0c1620993687b048f66e62cc07dd7fa333c494659ded50a860ae1bbcd7d6dd2d268711eb421ee9db384d023b1b440794dd55e278
-
Filesize
1.8MB
MD5696dcb33adf8702bef554833fe8defae
SHA1d4055ac6ce85b12310f25c718b93677f919866e0
SHA2561da7da6f47e2836240f6d2e93f46e569a5c6d29472e5f2198c15bd771803e0c2
SHA51227bfed81e9837fe3b83d863b0c1620993687b048f66e62cc07dd7fa333c494659ded50a860ae1bbcd7d6dd2d268711eb421ee9db384d023b1b440794dd55e278