Analysis
-
max time kernel
48s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2022 00:24
Static task
static1
General
-
Target
a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe
-
Size
1.8MB
-
MD5
0d4f32374d4c70dac19a26071a5f50d6
-
SHA1
b358e0653e58c561ed28c24c1d5012a63b414fef
-
SHA256
a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d
-
SHA512
e144301ba05c15fa2f3757d0878715f0ab9f6d207f7064c6c96d3b10da8c165e49dded4677101060267458c2f7f522fede382121e5d07d97056829cd2e207860
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3972 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 3972 oobeldr.exe 3972 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1988 schtasks.exe 4008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 3972 oobeldr.exe 3972 oobeldr.exe 3972 oobeldr.exe 3972 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1988 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 67 PID 1980 wrote to memory of 1988 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 67 PID 1980 wrote to memory of 1988 1980 a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe 67 PID 3972 wrote to memory of 4008 3972 oobeldr.exe 69 PID 3972 wrote to memory of 4008 3972 oobeldr.exe 69 PID 3972 wrote to memory of 4008 3972 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe"C:\Users\Admin\AppData\Local\Temp\a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4008
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50d4f32374d4c70dac19a26071a5f50d6
SHA1b358e0653e58c561ed28c24c1d5012a63b414fef
SHA256a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d
SHA512e144301ba05c15fa2f3757d0878715f0ab9f6d207f7064c6c96d3b10da8c165e49dded4677101060267458c2f7f522fede382121e5d07d97056829cd2e207860
-
Filesize
1.8MB
MD50d4f32374d4c70dac19a26071a5f50d6
SHA1b358e0653e58c561ed28c24c1d5012a63b414fef
SHA256a27f90d9b5454cff8b80b16cc47acfa0765a9e0a6daaded72f3437a5b64afd6d
SHA512e144301ba05c15fa2f3757d0878715f0ab9f6d207f7064c6c96d3b10da8c165e49dded4677101060267458c2f7f522fede382121e5d07d97056829cd2e207860