Analysis
-
max time kernel
102s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2022 04:23
Static task
static1
General
-
Target
220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe
-
Size
1.8MB
-
MD5
6b5e38c229cc8d8829c91f68457f274c
-
SHA1
93c878440182803865a6cf7728f685938013decf
-
SHA256
220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639
-
SHA512
a0405f9baa88bbec44a344b1a78a78a1b2b5f380fa7d6f82b699580b66344a4f4a54cf59157868d0a4be16ae06f5bed58ba5de0e65c69f1e07df63acf2836ce3
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3520 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3520 oobeldr.exe 3520 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4248 schtasks.exe 1492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 3520 oobeldr.exe 3520 oobeldr.exe 3520 oobeldr.exe 3520 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3516 wrote to memory of 1492 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 66 PID 3516 wrote to memory of 1492 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 66 PID 3516 wrote to memory of 1492 3516 220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe 66 PID 3520 wrote to memory of 4248 3520 oobeldr.exe 69 PID 3520 wrote to memory of 4248 3520 oobeldr.exe 69 PID 3520 wrote to memory of 4248 3520 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe"C:\Users\Admin\AppData\Local\Temp\220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1492
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4248
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD56b5e38c229cc8d8829c91f68457f274c
SHA193c878440182803865a6cf7728f685938013decf
SHA256220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639
SHA512a0405f9baa88bbec44a344b1a78a78a1b2b5f380fa7d6f82b699580b66344a4f4a54cf59157868d0a4be16ae06f5bed58ba5de0e65c69f1e07df63acf2836ce3
-
Filesize
1.8MB
MD56b5e38c229cc8d8829c91f68457f274c
SHA193c878440182803865a6cf7728f685938013decf
SHA256220fc981c9b9a9d06127bdc30079a04954ff2875026bd3a64394d4ddf41ee639
SHA512a0405f9baa88bbec44a344b1a78a78a1b2b5f380fa7d6f82b699580b66344a4f4a54cf59157868d0a4be16ae06f5bed58ba5de0e65c69f1e07df63acf2836ce3