Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 19:51
Static task
static1
General
-
Target
1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe
-
Size
1.8MB
-
MD5
40ca3e4641cc4264afd99289964a96c0
-
SHA1
ee251470638d9cd2bc5d4360d1f052530b0bcb58
-
SHA256
1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72
-
SHA512
513267e7b65c1c5005a04acdcc7127b0d1051fd7432247e643b2e0f260aa7741537626054ad972ae9d9b2d9fca86f1b4ed7e437db4d941eedd066f873cf5da9c
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4864 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4864 oobeldr.exe 4864 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1356 schtasks.exe 396 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 4864 oobeldr.exe 4864 oobeldr.exe 4864 oobeldr.exe 4864 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4828 wrote to memory of 1356 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 83 PID 4828 wrote to memory of 1356 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 83 PID 4828 wrote to memory of 1356 4828 1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe 83 PID 4864 wrote to memory of 396 4864 oobeldr.exe 99 PID 4864 wrote to memory of 396 4864 oobeldr.exe 99 PID 4864 wrote to memory of 396 4864 oobeldr.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe"C:\Users\Admin\AppData\Local\Temp\1cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1356
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD540ca3e4641cc4264afd99289964a96c0
SHA1ee251470638d9cd2bc5d4360d1f052530b0bcb58
SHA2561cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72
SHA512513267e7b65c1c5005a04acdcc7127b0d1051fd7432247e643b2e0f260aa7741537626054ad972ae9d9b2d9fca86f1b4ed7e437db4d941eedd066f873cf5da9c
-
Filesize
1.8MB
MD540ca3e4641cc4264afd99289964a96c0
SHA1ee251470638d9cd2bc5d4360d1f052530b0bcb58
SHA2561cdf1fc527c7d244542942a09d9fdbf29b7f099aa6d70f31b7322163cbf65a72
SHA512513267e7b65c1c5005a04acdcc7127b0d1051fd7432247e643b2e0f260aa7741537626054ad972ae9d9b2d9fca86f1b4ed7e437db4d941eedd066f873cf5da9c