Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/10/2022, 10:39
Static task
static1
General
-
Target
efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe
-
Size
1.8MB
-
MD5
fd76c2afe52d2b1a7a8dcf38f078e7f9
-
SHA1
682d88ac43ade16a1489fbcb41775fbad0e4383a
-
SHA256
efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88
-
SHA512
1047988fb7c86db67921bcc4c93b9f958ecc7378cc509f60d2b3cf6770531d5f151990be272c74a93f9574535e328efbf0e65fcf1c1d7cff2b718b74f0f489f0
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4072 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 4072 oobeldr.exe 4072 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe 1868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 4072 oobeldr.exe 4072 oobeldr.exe 4072 oobeldr.exe 4072 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 4764 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 66 PID 2808 wrote to memory of 4764 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 66 PID 2808 wrote to memory of 4764 2808 efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe 66 PID 4072 wrote to memory of 1868 4072 oobeldr.exe 69 PID 4072 wrote to memory of 1868 4072 oobeldr.exe 69 PID 4072 wrote to memory of 1868 4072 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe"C:\Users\Admin\AppData\Local\Temp\efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4764
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1868
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5fd76c2afe52d2b1a7a8dcf38f078e7f9
SHA1682d88ac43ade16a1489fbcb41775fbad0e4383a
SHA256efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88
SHA5121047988fb7c86db67921bcc4c93b9f958ecc7378cc509f60d2b3cf6770531d5f151990be272c74a93f9574535e328efbf0e65fcf1c1d7cff2b718b74f0f489f0
-
Filesize
1.8MB
MD5fd76c2afe52d2b1a7a8dcf38f078e7f9
SHA1682d88ac43ade16a1489fbcb41775fbad0e4383a
SHA256efa145717720374c1f95f4ae3d77388a9961fc273173e60fc6111842a5fa3a88
SHA5121047988fb7c86db67921bcc4c93b9f958ecc7378cc509f60d2b3cf6770531d5f151990be272c74a93f9574535e328efbf0e65fcf1c1d7cff2b718b74f0f489f0