Analysis
-
max time kernel
54s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2022 03:53
Static task
static1
General
-
Target
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe
-
Size
1.8MB
-
MD5
3471689db6efeea777cce79294589467
-
SHA1
b3ebf6c3cb4c2c4621451d112819789aa7615fcd
-
SHA256
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34
-
SHA512
810ff7976121f333f8ce02030f8766980455e1a26d9d09701f2728a3bccb80ecec944da82ef5e3046bdaa47d8248099dc6512ed7abe34137d076f10527f21fc6
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 5116 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exepid process 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 5116 oobeldr.exe 5116 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2168 schtasks.exe 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exepid process 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe 5116 oobeldr.exe 5116 oobeldr.exe 5116 oobeldr.exe 5116 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exeoobeldr.exedescription pid process target process PID 3528 wrote to memory of 2168 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe schtasks.exe PID 3528 wrote to memory of 2168 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe schtasks.exe PID 3528 wrote to memory of 2168 3528 fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe schtasks.exe PID 5116 wrote to memory of 4956 5116 oobeldr.exe schtasks.exe PID 5116 wrote to memory of 4956 5116 oobeldr.exe schtasks.exe PID 5116 wrote to memory of 4956 5116 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe"C:\Users\Admin\AppData\Local\Temp\fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD53471689db6efeea777cce79294589467
SHA1b3ebf6c3cb4c2c4621451d112819789aa7615fcd
SHA256fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34
SHA512810ff7976121f333f8ce02030f8766980455e1a26d9d09701f2728a3bccb80ecec944da82ef5e3046bdaa47d8248099dc6512ed7abe34137d076f10527f21fc6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD53471689db6efeea777cce79294589467
SHA1b3ebf6c3cb4c2c4621451d112819789aa7615fcd
SHA256fe5fbfedbf7fee61617678a88c21c6dd124741de318b33634a34516cb53c9a34
SHA512810ff7976121f333f8ce02030f8766980455e1a26d9d09701f2728a3bccb80ecec944da82ef5e3046bdaa47d8248099dc6512ed7abe34137d076f10527f21fc6
-
memory/2168-179-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-186-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-185-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-184-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-183-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-182-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-181-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-180-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-167-0x0000000000000000-mapping.dmp
-
memory/2168-178-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-177-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-176-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-175-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-174-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-173-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-172-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-171-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-169-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2168-168-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-137-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-138-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-141-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-142-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-144-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-143-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-145-0x0000000000F90000-0x0000000000FD4000-memory.dmpFilesize
272KB
-
memory/3528-146-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-147-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-148-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-150-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-151-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-149-0x0000000000B20000-0x0000000000E3F000-memory.dmpFilesize
3.1MB
-
memory/3528-152-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-153-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-154-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-156-0x0000000000B20000-0x0000000000E3F000-memory.dmpFilesize
3.1MB
-
memory/3528-155-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-157-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-158-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-159-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-160-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-161-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-162-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-163-0x0000000000B21000-0x0000000000B23000-memory.dmpFilesize
8KB
-
memory/3528-164-0x0000000000B21000-0x0000000000B23000-memory.dmpFilesize
8KB
-
memory/3528-165-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-166-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-139-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-140-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-118-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-170-0x0000000000B20000-0x0000000000E3F000-memory.dmpFilesize
3.1MB
-
memory/3528-136-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-133-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-134-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-135-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-132-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-131-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-130-0x0000000000B20000-0x0000000000E3F000-memory.dmpFilesize
3.1MB
-
memory/3528-129-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-128-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-127-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-126-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-125-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-124-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-123-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-122-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-121-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-188-0x0000000000F90000-0x0000000000FD4000-memory.dmpFilesize
272KB
-
memory/3528-187-0x0000000000B20000-0x0000000000E3F000-memory.dmpFilesize
3.1MB
-
memory/3528-120-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3528-119-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/4956-234-0x0000000000000000-mapping.dmp
-
memory/5116-253-0x0000000000D80000-0x000000000109F000-memory.dmpFilesize
3.1MB
-
memory/5116-254-0x0000000000800000-0x000000000094A000-memory.dmpFilesize
1.3MB
-
memory/5116-255-0x0000000000D80000-0x000000000109F000-memory.dmpFilesize
3.1MB
-
memory/5116-256-0x0000000000D80000-0x000000000109F000-memory.dmpFilesize
3.1MB
-
memory/5116-257-0x0000000000800000-0x000000000094A000-memory.dmpFilesize
1.3MB