Analysis
-
max time kernel
63s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 14:16
Static task
static1
General
-
Target
e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe
-
Size
1.8MB
-
MD5
ed17f8407d6bcf03446dd019e6cea1f1
-
SHA1
5ece476080e272b078946645c20a06655da91965
-
SHA256
e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea
-
SHA512
a11edaf2285404fe95377b88e31f76a4cb4d8c6655c28a4cfbec196d71b2ed08671ccfcad137b214a1987552d0237c5095b062dac0857b5b456a8ae94c1101a5
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3340 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 3340 oobeldr.exe 3340 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 3340 oobeldr.exe 3340 oobeldr.exe 3340 oobeldr.exe 3340 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4828 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 80 PID 2476 wrote to memory of 4828 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 80 PID 2476 wrote to memory of 4828 2476 e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe 80 PID 3340 wrote to memory of 440 3340 oobeldr.exe 90 PID 3340 wrote to memory of 440 3340 oobeldr.exe 90 PID 3340 wrote to memory of 440 3340 oobeldr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe"C:\Users\Admin\AppData\Local\Temp\e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:440
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ed17f8407d6bcf03446dd019e6cea1f1
SHA15ece476080e272b078946645c20a06655da91965
SHA256e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea
SHA512a11edaf2285404fe95377b88e31f76a4cb4d8c6655c28a4cfbec196d71b2ed08671ccfcad137b214a1987552d0237c5095b062dac0857b5b456a8ae94c1101a5
-
Filesize
1.8MB
MD5ed17f8407d6bcf03446dd019e6cea1f1
SHA15ece476080e272b078946645c20a06655da91965
SHA256e4d6277728c329abf71425f54cc569f17159f5d35f7191b35e212ebd50a239ea
SHA512a11edaf2285404fe95377b88e31f76a4cb4d8c6655c28a4cfbec196d71b2ed08671ccfcad137b214a1987552d0237c5095b062dac0857b5b456a8ae94c1101a5