Analysis
-
max time kernel
77s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 02:55
Static task
static1
General
-
Target
2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe
-
Size
1.8MB
-
MD5
7ea2fc5efe15be5bb4f42b7285e3bd72
-
SHA1
0b220b8ec2f5c72d503466da92394dfbafb7223e
-
SHA256
2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213
-
SHA512
f288472b36e52aac018b38241c41fb8f0d10301a05dafd3a5ec596160b4a0fcb66204f2441ee35ce966a6d79305638f3c401d0eeacd105829aafacdd2b1fecc8
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4976 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 4976 oobeldr.exe 4976 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe 4540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 4976 oobeldr.exe 4976 oobeldr.exe 4976 oobeldr.exe 4976 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2388 wrote to memory of 4896 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 82 PID 2388 wrote to memory of 4896 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 82 PID 2388 wrote to memory of 4896 2388 2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe 82 PID 4976 wrote to memory of 4540 4976 oobeldr.exe 96 PID 4976 wrote to memory of 4540 4976 oobeldr.exe 96 PID 4976 wrote to memory of 4540 4976 oobeldr.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe"C:\Users\Admin\AppData\Local\Temp\2c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4540
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD57ea2fc5efe15be5bb4f42b7285e3bd72
SHA10b220b8ec2f5c72d503466da92394dfbafb7223e
SHA2562c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213
SHA512f288472b36e52aac018b38241c41fb8f0d10301a05dafd3a5ec596160b4a0fcb66204f2441ee35ce966a6d79305638f3c401d0eeacd105829aafacdd2b1fecc8
-
Filesize
1.8MB
MD57ea2fc5efe15be5bb4f42b7285e3bd72
SHA10b220b8ec2f5c72d503466da92394dfbafb7223e
SHA2562c2448c4194da2bbec0e515bdae97388d02c2f605faf6520d2c0db5a1d11d213
SHA512f288472b36e52aac018b38241c41fb8f0d10301a05dafd3a5ec596160b4a0fcb66204f2441ee35ce966a6d79305638f3c401d0eeacd105829aafacdd2b1fecc8