Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30/09/2022, 09:57
Static task
static1
General
-
Target
c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe
-
Size
1.8MB
-
MD5
e8c9bc0feb27e4cb3890a821b249b5a1
-
SHA1
615cdb311f985c3b926dea651522e7e4a3ecf12a
-
SHA256
c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229
-
SHA512
a734613732dac1c1421b784311e7a15e57538577fe34fc9e14cd1403ed976b298d80f3345154c6dabf6a8f5b199a6d6bec8116e85d03830874954b8ca6569a90
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3316 oobeldr.exe 3316 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4760 schtasks.exe 3544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 3316 oobeldr.exe 3316 oobeldr.exe 3316 oobeldr.exe 3316 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4760 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 66 PID 3468 wrote to memory of 4760 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 66 PID 3468 wrote to memory of 4760 3468 c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe 66 PID 3316 wrote to memory of 3544 3316 oobeldr.exe 69 PID 3316 wrote to memory of 3544 3316 oobeldr.exe 69 PID 3316 wrote to memory of 3544 3316 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe"C:\Users\Admin\AppData\Local\Temp\c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4760
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3544
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e8c9bc0feb27e4cb3890a821b249b5a1
SHA1615cdb311f985c3b926dea651522e7e4a3ecf12a
SHA256c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229
SHA512a734613732dac1c1421b784311e7a15e57538577fe34fc9e14cd1403ed976b298d80f3345154c6dabf6a8f5b199a6d6bec8116e85d03830874954b8ca6569a90
-
Filesize
1.8MB
MD5e8c9bc0feb27e4cb3890a821b249b5a1
SHA1615cdb311f985c3b926dea651522e7e4a3ecf12a
SHA256c20ec7be9c40520907f7a87afac0c9c6b63f36a05ba1b094824669b407a06229
SHA512a734613732dac1c1421b784311e7a15e57538577fe34fc9e14cd1403ed976b298d80f3345154c6dabf6a8f5b199a6d6bec8116e85d03830874954b8ca6569a90