Analysis

  • max time kernel
    76s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/10/2022, 16:50

General

  • Target

    50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe

  • Size

    1.8MB

  • MD5

    9a84c9b7e32062266a47c5816f90b0c8

  • SHA1

    68275e515a7065369192cfb096ba57158de3642c

  • SHA256

    50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436

  • SHA512

    31e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757

  • SSDEEP

    49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe
    "C:\Users\Admin\AppData\Local\Temp\50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
      2⤵
      • Creates scheduled task(s)
      PID:1480
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\SysWOW64\schtasks.exe
      /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
      2⤵
      • Creates scheduled task(s)
      PID:4140

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          1.8MB

          MD5

          9a84c9b7e32062266a47c5816f90b0c8

          SHA1

          68275e515a7065369192cfb096ba57158de3642c

          SHA256

          50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436

          SHA512

          31e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          1.8MB

          MD5

          9a84c9b7e32062266a47c5816f90b0c8

          SHA1

          68275e515a7065369192cfb096ba57158de3642c

          SHA256

          50986cf7c99253455087af8573c2bb3e4bb34b70f424aed9c6baa7ec433a1436

          SHA512

          31e55193f4d1b65ac4fe7024de810c2b9b3f2bb866e260e36274fa3569dcaa2792c27865db290964eb1c6e1ee014fc4f63727050f4fb1d204a99b51fcf800757

        • memory/1480-181-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-188-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-187-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-186-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-185-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-184-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-183-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-182-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-180-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-179-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-178-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-177-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-176-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-175-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-174-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-173-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-172-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/1480-171-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-139-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-141-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-143-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-144-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-145-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-146-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-147-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-148-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-149-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-150-0x00000000031F0000-0x0000000003234000-memory.dmp

          Filesize

          272KB

        • memory/2752-151-0x0000000000C00000-0x0000000000F1F000-memory.dmp

          Filesize

          3.1MB

        • memory/2752-152-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-153-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-154-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-155-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-156-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-157-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-158-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-160-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-159-0x0000000000C00000-0x0000000000F1F000-memory.dmp

          Filesize

          3.1MB

        • memory/2752-161-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-162-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-163-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-164-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-165-0x0000000000C00000-0x0000000000F1F000-memory.dmp

          Filesize

          3.1MB

        • memory/2752-166-0x0000000000C01000-0x0000000000C03000-memory.dmp

          Filesize

          8KB

        • memory/2752-167-0x0000000000C01000-0x0000000000C03000-memory.dmp

          Filesize

          8KB

        • memory/2752-168-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-169-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-142-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-140-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-120-0x0000000000C00000-0x0000000000F1F000-memory.dmp

          Filesize

          3.1MB

        • memory/2752-138-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-137-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-136-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-135-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-134-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-133-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-132-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-131-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-130-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-129-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-128-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-127-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-126-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-125-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-124-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-122-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-189-0x0000000000C00000-0x0000000000F1F000-memory.dmp

          Filesize

          3.1MB

        • memory/2752-190-0x00000000031F0000-0x0000000003234000-memory.dmp

          Filesize

          272KB

        • memory/2752-123-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/2752-121-0x00000000772C0000-0x000000007744E000-memory.dmp

          Filesize

          1.6MB

        • memory/4104-249-0x0000000000FA0000-0x00000000012BF000-memory.dmp

          Filesize

          3.1MB

        • memory/4104-251-0x0000000000B90000-0x0000000000CDA000-memory.dmp

          Filesize

          1.3MB

        • memory/4104-257-0x0000000000FA0000-0x00000000012BF000-memory.dmp

          Filesize

          3.1MB

        • memory/4104-258-0x0000000000B90000-0x0000000000CDA000-memory.dmp

          Filesize

          1.3MB