Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/10/2022, 19:53
Static task
static1
General
-
Target
71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe
-
Size
1.8MB
-
MD5
92681d10f7aa0ff851d6483ec726aaae
-
SHA1
c1aafc086d187386ee48ccf2760a67aeb97c52ce
-
SHA256
71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426
-
SHA512
32941b62b35cb485ed964be9dacfa12ca1309ee2c888f97f78f45133e2fc7f7a3314b053903e9bd6940be12faa184bb31f6fcae228d4aa4910ebaa86d7e1a225
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4712 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 4712 oobeldr.exe 4712 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4664 schtasks.exe 5008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 4712 oobeldr.exe 4712 oobeldr.exe 4712 oobeldr.exe 4712 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4664 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 66 PID 2364 wrote to memory of 4664 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 66 PID 2364 wrote to memory of 4664 2364 71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe 66 PID 4712 wrote to memory of 5008 4712 oobeldr.exe 69 PID 4712 wrote to memory of 5008 4712 oobeldr.exe 69 PID 4712 wrote to memory of 5008 4712 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe"C:\Users\Admin\AppData\Local\Temp\71e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4664
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:5008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD592681d10f7aa0ff851d6483ec726aaae
SHA1c1aafc086d187386ee48ccf2760a67aeb97c52ce
SHA25671e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426
SHA51232941b62b35cb485ed964be9dacfa12ca1309ee2c888f97f78f45133e2fc7f7a3314b053903e9bd6940be12faa184bb31f6fcae228d4aa4910ebaa86d7e1a225
-
Filesize
1.8MB
MD592681d10f7aa0ff851d6483ec726aaae
SHA1c1aafc086d187386ee48ccf2760a67aeb97c52ce
SHA25671e934b1f649b20a15f8d7e5e2099e21fbe0180475a33c690558a773c3a1d426
SHA51232941b62b35cb485ed964be9dacfa12ca1309ee2c888f97f78f45133e2fc7f7a3314b053903e9bd6940be12faa184bb31f6fcae228d4aa4910ebaa86d7e1a225