Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 04:39
Static task
static1
General
-
Target
72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe
-
Size
1.8MB
-
MD5
8d413fb39338458ca2be087f9935f48e
-
SHA1
40cc8d78b26136db93d21a0c682167cddadd02fd
-
SHA256
72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab
-
SHA512
8dba5e0bbfed950a397397f477f347d5da0380c9c519728263a683871c2d615d8d851abeba6d7d00f2fe6fd33d6f2077d74329b655b2efb9c77bd87e99bd9a2d
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3112 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3112 oobeldr.exe 3112 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 204 schtasks.exe 2120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 3112 oobeldr.exe 3112 oobeldr.exe 3112 oobeldr.exe 3112 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3284 wrote to memory of 204 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 85 PID 3284 wrote to memory of 204 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 85 PID 3284 wrote to memory of 204 3284 72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe 85 PID 3112 wrote to memory of 2120 3112 oobeldr.exe 96 PID 3112 wrote to memory of 2120 3112 oobeldr.exe 96 PID 3112 wrote to memory of 2120 3112 oobeldr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe"C:\Users\Admin\AppData\Local\Temp\72fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:204
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD58d413fb39338458ca2be087f9935f48e
SHA140cc8d78b26136db93d21a0c682167cddadd02fd
SHA25672fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab
SHA5128dba5e0bbfed950a397397f477f347d5da0380c9c519728263a683871c2d615d8d851abeba6d7d00f2fe6fd33d6f2077d74329b655b2efb9c77bd87e99bd9a2d
-
Filesize
1.8MB
MD58d413fb39338458ca2be087f9935f48e
SHA140cc8d78b26136db93d21a0c682167cddadd02fd
SHA25672fd4a41dcf323f65c665d0366533d670505af554825572e42b9fdc349b0eeab
SHA5128dba5e0bbfed950a397397f477f347d5da0380c9c519728263a683871c2d615d8d851abeba6d7d00f2fe6fd33d6f2077d74329b655b2efb9c77bd87e99bd9a2d