Analysis
-
max time kernel
68s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 16:35
Static task
static1
General
-
Target
933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe
-
Size
1.8MB
-
MD5
2bae3953e0a75b8a24b51d065815f205
-
SHA1
ad0bf7ff1a9fc281cdf2b3d551968cef2104d8ca
-
SHA256
933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd
-
SHA512
c1ac299c6c0ea97d5c1503eb97412f3b3c8eef9d76697dd1517a3d3048ca6e71016f621b0f5e787285cee968cd9ac8e2eec88dc34bcce1d0baf423a2fa54c8dc
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4988 oobeldr.exe 4988 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 432 schtasks.exe 4856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 4988 oobeldr.exe 4988 oobeldr.exe 4988 oobeldr.exe 4988 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4496 wrote to memory of 432 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 80 PID 4496 wrote to memory of 432 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 80 PID 4496 wrote to memory of 432 4496 933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe 80 PID 4988 wrote to memory of 4856 4988 oobeldr.exe 90 PID 4988 wrote to memory of 4856 4988 oobeldr.exe 90 PID 4988 wrote to memory of 4856 4988 oobeldr.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe"C:\Users\Admin\AppData\Local\Temp\933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:432
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4856
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD52bae3953e0a75b8a24b51d065815f205
SHA1ad0bf7ff1a9fc281cdf2b3d551968cef2104d8ca
SHA256933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd
SHA512c1ac299c6c0ea97d5c1503eb97412f3b3c8eef9d76697dd1517a3d3048ca6e71016f621b0f5e787285cee968cd9ac8e2eec88dc34bcce1d0baf423a2fa54c8dc
-
Filesize
1.8MB
MD52bae3953e0a75b8a24b51d065815f205
SHA1ad0bf7ff1a9fc281cdf2b3d551968cef2104d8ca
SHA256933c1d35469f45c6a77fbc723826381f746a251f911337f62496fbf314a5e2dd
SHA512c1ac299c6c0ea97d5c1503eb97412f3b3c8eef9d76697dd1517a3d3048ca6e71016f621b0f5e787285cee968cd9ac8e2eec88dc34bcce1d0baf423a2fa54c8dc