Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2022 21:59
Static task
static1
General
-
Target
da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe
-
Size
1.8MB
-
MD5
5d7e9519d35a40b19f4e5ae6d74600bc
-
SHA1
58739d870588963bdda829517aa76e1616fd586c
-
SHA256
da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda
-
SHA512
1d4f07e8c323ca95873b07126a43f3664720f84922a05bcdbd7371193b2aa7b5029d69fd70d3227e5dff17d269102344674f611fcd1f003f1c3fa698f8008a01
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3340 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 3340 oobeldr.exe 3340 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1640 schtasks.exe 428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 3340 oobeldr.exe 3340 oobeldr.exe 3340 oobeldr.exe 3340 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1640 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 83 PID 4752 wrote to memory of 1640 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 83 PID 4752 wrote to memory of 1640 4752 da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe 83 PID 3340 wrote to memory of 428 3340 oobeldr.exe 87 PID 3340 wrote to memory of 428 3340 oobeldr.exe 87 PID 3340 wrote to memory of 428 3340 oobeldr.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe"C:\Users\Admin\AppData\Local\Temp\da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1640
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:428
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55d7e9519d35a40b19f4e5ae6d74600bc
SHA158739d870588963bdda829517aa76e1616fd586c
SHA256da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda
SHA5121d4f07e8c323ca95873b07126a43f3664720f84922a05bcdbd7371193b2aa7b5029d69fd70d3227e5dff17d269102344674f611fcd1f003f1c3fa698f8008a01
-
Filesize
1.8MB
MD55d7e9519d35a40b19f4e5ae6d74600bc
SHA158739d870588963bdda829517aa76e1616fd586c
SHA256da464940ce381d3fa3fad6da26b9ce7ba3c1bc8a5e9296b0861094281901acda
SHA5121d4f07e8c323ca95873b07126a43f3664720f84922a05bcdbd7371193b2aa7b5029d69fd70d3227e5dff17d269102344674f611fcd1f003f1c3fa698f8008a01