Analysis
-
max time kernel
52s -
max time network
143s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2022 21:04
Static task
static1
General
-
Target
7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe
-
Size
1.8MB
-
MD5
a9e7d1dbd918dacbc8f3f20be56b9c17
-
SHA1
dda8196c27e26c363f10f1e695770f689b59292a
-
SHA256
7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2
-
SHA512
1503140882142e9bdd57df8ecaa47f2c388268cd47dd083cf7cd357d13130dd5bda773883b32cdf3f3fbeb36f174a676d1fc1ffa0139b4d45d8910152c33e636
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4088 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 4088 oobeldr.exe 4088 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4744 schtasks.exe 424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 4088 oobeldr.exe 4088 oobeldr.exe 4088 oobeldr.exe 4088 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4744 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 66 PID 2656 wrote to memory of 4744 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 66 PID 2656 wrote to memory of 4744 2656 7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe 66 PID 4088 wrote to memory of 424 4088 oobeldr.exe 69 PID 4088 wrote to memory of 424 4088 oobeldr.exe 69 PID 4088 wrote to memory of 424 4088 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe"C:\Users\Admin\AppData\Local\Temp\7747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4744
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a9e7d1dbd918dacbc8f3f20be56b9c17
SHA1dda8196c27e26c363f10f1e695770f689b59292a
SHA2567747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2
SHA5121503140882142e9bdd57df8ecaa47f2c388268cd47dd083cf7cd357d13130dd5bda773883b32cdf3f3fbeb36f174a676d1fc1ffa0139b4d45d8910152c33e636
-
Filesize
1.8MB
MD5a9e7d1dbd918dacbc8f3f20be56b9c17
SHA1dda8196c27e26c363f10f1e695770f689b59292a
SHA2567747b0d65cd80d7c31c52db2e9f4a6f953aad7602fb4f5745c401df68358f6c2
SHA5121503140882142e9bdd57df8ecaa47f2c388268cd47dd083cf7cd357d13130dd5bda773883b32cdf3f3fbeb36f174a676d1fc1ffa0139b4d45d8910152c33e636