Analysis
-
max time kernel
79s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2022 05:13
Static task
static1
General
-
Target
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe
-
Size
1.8MB
-
MD5
d124b2ff4ffe1d4cc8cbf7e3a19746fa
-
SHA1
6d13bdb5b281e57795da79d685c4495545c6be84
-
SHA256
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68
-
SHA512
55e46b7fbb339b5977e36198c3bcb321a0273ecd112dcb5340d9be202ab981ccd477985882118374aabc19839bbf76c2814e1499ff6f72f0a03a24c5bd5ee2f7
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 3800 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exepid process 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3800 oobeldr.exe 3800 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2180 schtasks.exe 4284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exepid process 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe 3800 oobeldr.exe 3800 oobeldr.exe 3800 oobeldr.exe 3800 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exeoobeldr.exedescription pid process target process PID 3540 wrote to memory of 2180 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe schtasks.exe PID 3540 wrote to memory of 2180 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe schtasks.exe PID 3540 wrote to memory of 2180 3540 92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe schtasks.exe PID 3800 wrote to memory of 4284 3800 oobeldr.exe schtasks.exe PID 3800 wrote to memory of 4284 3800 oobeldr.exe schtasks.exe PID 3800 wrote to memory of 4284 3800 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe"C:\Users\Admin\AppData\Local\Temp\92a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD5d124b2ff4ffe1d4cc8cbf7e3a19746fa
SHA16d13bdb5b281e57795da79d685c4495545c6be84
SHA25692a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68
SHA51255e46b7fbb339b5977e36198c3bcb321a0273ecd112dcb5340d9be202ab981ccd477985882118374aabc19839bbf76c2814e1499ff6f72f0a03a24c5bd5ee2f7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD5d124b2ff4ffe1d4cc8cbf7e3a19746fa
SHA16d13bdb5b281e57795da79d685c4495545c6be84
SHA25692a942d912472ae64d349a35addc3f1d2d46f3efd3b0973b7b0d3e8b30e97a68
SHA51255e46b7fbb339b5977e36198c3bcb321a0273ecd112dcb5340d9be202ab981ccd477985882118374aabc19839bbf76c2814e1499ff6f72f0a03a24c5bd5ee2f7
-
memory/2180-179-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-186-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-185-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-184-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-183-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-182-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-181-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-180-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-168-0x0000000000000000-mapping.dmp
-
memory/2180-178-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-177-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-176-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-175-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-174-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-173-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-172-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-171-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-170-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/2180-169-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-138-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-137-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-141-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-142-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-143-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-144-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-145-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-146-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-147-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-148-0x0000000002E70000-0x0000000002EB4000-memory.dmpFilesize
272KB
-
memory/3540-149-0x0000000000A20000-0x0000000000D3F000-memory.dmpFilesize
3.1MB
-
memory/3540-150-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-151-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-152-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-153-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-154-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-155-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-156-0x0000000000A20000-0x0000000000D3F000-memory.dmpFilesize
3.1MB
-
memory/3540-157-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-158-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-159-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-160-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-161-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-162-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-164-0x0000000000A21000-0x0000000000A23000-memory.dmpFilesize
8KB
-
memory/3540-163-0x0000000000A20000-0x0000000000D3F000-memory.dmpFilesize
3.1MB
-
memory/3540-165-0x0000000000A21000-0x0000000000A23000-memory.dmpFilesize
8KB
-
memory/3540-166-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-167-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-139-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-118-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-140-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-136-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-132-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-135-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-134-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-133-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-131-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-129-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-130-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-128-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-127-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-126-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-125-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-124-0x0000000000A20000-0x0000000000D3F000-memory.dmpFilesize
3.1MB
-
memory/3540-123-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-122-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-121-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-187-0x0000000000A20000-0x0000000000D3F000-memory.dmpFilesize
3.1MB
-
memory/3540-188-0x0000000002E70000-0x0000000002EB4000-memory.dmpFilesize
272KB
-
memory/3540-120-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3540-119-0x0000000077550000-0x00000000776DE000-memory.dmpFilesize
1.6MB
-
memory/3800-229-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/3800-230-0x0000000000890000-0x00000000008D4000-memory.dmpFilesize
272KB
-
memory/3800-233-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/3800-234-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/3800-257-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/3800-258-0x0000000000890000-0x00000000008D4000-memory.dmpFilesize
272KB
-
memory/3800-259-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/3800-260-0x0000000000FB0000-0x00000000012CF000-memory.dmpFilesize
3.1MB
-
memory/4284-238-0x0000000000000000-mapping.dmp