Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2022, 13:36
Static task
static1
General
-
Target
e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe
-
Size
1.8MB
-
MD5
9f876903ef62a60a4adcb1da612047c9
-
SHA1
5aed2903226494c6cf6e02ace37ae507c37a1523
-
SHA256
e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253
-
SHA512
acecd310803adf5ae7d9a8f15f268b18cea68856d9e6ef3f2e1fa03b5ce555b1c864f1cf4fcc25137088c4ad05020897c9439be10ee7e4fd05d043fb595bb301
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 4192 oobeldr.exe 4192 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2400 schtasks.exe 3324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 4192 oobeldr.exe 4192 oobeldr.exe 4192 oobeldr.exe 4192 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 524 wrote to memory of 3324 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 85 PID 524 wrote to memory of 3324 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 85 PID 524 wrote to memory of 3324 524 e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe 85 PID 4192 wrote to memory of 2400 4192 oobeldr.exe 102 PID 4192 wrote to memory of 2400 4192 oobeldr.exe 102 PID 4192 wrote to memory of 2400 4192 oobeldr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe"C:\Users\Admin\AppData\Local\Temp\e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3324
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2400
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59f876903ef62a60a4adcb1da612047c9
SHA15aed2903226494c6cf6e02ace37ae507c37a1523
SHA256e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253
SHA512acecd310803adf5ae7d9a8f15f268b18cea68856d9e6ef3f2e1fa03b5ce555b1c864f1cf4fcc25137088c4ad05020897c9439be10ee7e4fd05d043fb595bb301
-
Filesize
1.8MB
MD59f876903ef62a60a4adcb1da612047c9
SHA15aed2903226494c6cf6e02ace37ae507c37a1523
SHA256e3f6765a4d636b9b61d27c3559790c5a5703e7cf9f6f25243bad5bef8e911253
SHA512acecd310803adf5ae7d9a8f15f268b18cea68856d9e6ef3f2e1fa03b5ce555b1c864f1cf4fcc25137088c4ad05020897c9439be10ee7e4fd05d043fb595bb301