Analysis
-
max time kernel
106s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 06:15
Static task
static1
General
-
Target
8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe
-
Size
1.8MB
-
MD5
5420759f6f10874e68a4a571e790cd35
-
SHA1
e74621672bcc6f18e7a1b659b7cfa44d463fcdb9
-
SHA256
8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2
-
SHA512
8e5a5dba07118a1c9197c727b4193f1fc16e3f5fb5ca9df01d740575f4c789a199cd7578aa9ddc319d488ba755e95158a31610556eada337aaf1637d4d3ca73d
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4984 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 4984 oobeldr.exe 4984 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3240 schtasks.exe 4796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 4984 oobeldr.exe 4984 oobeldr.exe 4984 oobeldr.exe 4984 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 3240 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 66 PID 1748 wrote to memory of 3240 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 66 PID 1748 wrote to memory of 3240 1748 8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe 66 PID 4984 wrote to memory of 4796 4984 oobeldr.exe 69 PID 4984 wrote to memory of 4796 4984 oobeldr.exe 69 PID 4984 wrote to memory of 4796 4984 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe"C:\Users\Admin\AppData\Local\Temp\8210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3240
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55420759f6f10874e68a4a571e790cd35
SHA1e74621672bcc6f18e7a1b659b7cfa44d463fcdb9
SHA2568210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2
SHA5128e5a5dba07118a1c9197c727b4193f1fc16e3f5fb5ca9df01d740575f4c789a199cd7578aa9ddc319d488ba755e95158a31610556eada337aaf1637d4d3ca73d
-
Filesize
1.8MB
MD55420759f6f10874e68a4a571e790cd35
SHA1e74621672bcc6f18e7a1b659b7cfa44d463fcdb9
SHA2568210b39859692ddaf942b292178f9ffe67b238eddf4206f457eb146927167dc2
SHA5128e5a5dba07118a1c9197c727b4193f1fc16e3f5fb5ca9df01d740575f4c789a199cd7578aa9ddc319d488ba755e95158a31610556eada337aaf1637d4d3ca73d