Analysis
-
max time kernel
76s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 16:50
Static task
static1
General
-
Target
50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe
-
Size
1.8MB
-
MD5
9a84c9b7e32062266a47c5816f90b0c8
-
SHA1
68275e515a7065369192cfb096ba57158de3642c
-
SHA256
50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436
-
SHA512
31e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4104 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 4104 oobeldr.exe 4104 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1480 schtasks.exe 4140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 4104 oobeldr.exe 4104 oobeldr.exe 4104 oobeldr.exe 4104 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1480 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 66 PID 2752 wrote to memory of 1480 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 66 PID 2752 wrote to memory of 1480 2752 50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe 66 PID 4104 wrote to memory of 4140 4104 oobeldr.exe 69 PID 4104 wrote to memory of 4140 4104 oobeldr.exe 69 PID 4104 wrote to memory of 4140 4104 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe"C:\Users\Admin\AppData\Local\Temp\50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59a84c9b7e32062266a47c5816f90b0c8
SHA168275e515a7065369192cfb096ba57158de3642c
SHA25650986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436
SHA51231e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757
-
Filesize
1.8MB
MD59a84c9b7e32062266a47c5816f90b0c8
SHA168275e515a7065369192cfb096ba57158de3642c
SHA25650986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436
SHA51231e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757