Analysis
-
max time kernel
77s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2022, 12:51
Static task
static1
General
-
Target
24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe
-
Size
1.8MB
-
MD5
48b2faf8f0460fff2438970d7fb5782e
-
SHA1
39a2d3a9d14cd4c78a5f39fa8670e48d7fb7e468
-
SHA256
24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3
-
SHA512
a137c9c36c4c6944de751a1422b985f319be94ff3cee9454d7171d82d70e8fac4266414e54ff2b8e0769fa548c68c5e70262ffe72731c5aed639ace9bb4b3e6a
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2428 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 2428 oobeldr.exe 2428 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2948 schtasks.exe 2504 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 2428 oobeldr.exe 2428 oobeldr.exe 2428 oobeldr.exe 2428 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3628 wrote to memory of 2948 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 85 PID 3628 wrote to memory of 2948 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 85 PID 3628 wrote to memory of 2948 3628 24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe 85 PID 2428 wrote to memory of 2504 2428 oobeldr.exe 103 PID 2428 wrote to memory of 2504 2428 oobeldr.exe 103 PID 2428 wrote to memory of 2504 2428 oobeldr.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe"C:\Users\Admin\AppData\Local\Temp\24c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2948
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD548b2faf8f0460fff2438970d7fb5782e
SHA139a2d3a9d14cd4c78a5f39fa8670e48d7fb7e468
SHA25624c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3
SHA512a137c9c36c4c6944de751a1422b985f319be94ff3cee9454d7171d82d70e8fac4266414e54ff2b8e0769fa548c68c5e70262ffe72731c5aed639ace9bb4b3e6a
-
Filesize
1.8MB
MD548b2faf8f0460fff2438970d7fb5782e
SHA139a2d3a9d14cd4c78a5f39fa8670e48d7fb7e468
SHA25624c1ab9e50305a41c10b65efd23b2443570239921f5546600d1e4cf39fa98bc3
SHA512a137c9c36c4c6944de751a1422b985f319be94ff3cee9454d7171d82d70e8fac4266414e54ff2b8e0769fa548c68c5e70262ffe72731c5aed639ace9bb4b3e6a