Analysis
-
max time kernel
52s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2022 03:15
Static task
static1
General
-
Target
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe
-
Size
1.8MB
-
MD5
d670797579d5e47292f5fb4bc6da7976
-
SHA1
0b4916d54492fc249e4542bba00fa7973f435332
-
SHA256
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f
-
SHA512
332b3fd844991f7ca5d9f8aa31c36f76cca6fea03879403da6f5743aa413bb73fb06d3afa26440e4c5345fc33a810c57066f49f8546123a351bbe94ae7b4c8c0
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 3344 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe -
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exepid process 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 3344 oobeldr.exe 3344 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2304 schtasks.exe 3548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exepid process 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe 3344 oobeldr.exe 3344 oobeldr.exe 3344 oobeldr.exe 3344 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exeoobeldr.exedescription pid process target process PID 2748 wrote to memory of 3548 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe schtasks.exe PID 2748 wrote to memory of 3548 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe schtasks.exe PID 2748 wrote to memory of 3548 2748 6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe schtasks.exe PID 3344 wrote to memory of 2304 3344 oobeldr.exe schtasks.exe PID 3344 wrote to memory of 2304 3344 oobeldr.exe schtasks.exe PID 3344 wrote to memory of 2304 3344 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe"C:\Users\Admin\AppData\Local\Temp\6c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD5d670797579d5e47292f5fb4bc6da7976
SHA10b4916d54492fc249e4542bba00fa7973f435332
SHA2566c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f
SHA512332b3fd844991f7ca5d9f8aa31c36f76cca6fea03879403da6f5743aa413bb73fb06d3afa26440e4c5345fc33a810c57066f49f8546123a351bbe94ae7b4c8c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD5d670797579d5e47292f5fb4bc6da7976
SHA10b4916d54492fc249e4542bba00fa7973f435332
SHA2566c14caeb9d12c59ab0730bfe81bf44f94fddcc6c17ee3af55dd5eb0313b4b17f
SHA512332b3fd844991f7ca5d9f8aa31c36f76cca6fea03879403da6f5743aa413bb73fb06d3afa26440e4c5345fc33a810c57066f49f8546123a351bbe94ae7b4c8c0
-
memory/2304-239-0x0000000000000000-mapping.dmp
-
memory/2748-158-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-150-0x00000000012B0000-0x00000000015CF000-memory.dmpFilesize
3.1MB
-
memory/2748-123-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-124-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-125-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-126-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-127-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-128-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-129-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-130-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-131-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-132-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-133-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-134-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-135-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-136-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-137-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-138-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-139-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-140-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-141-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-142-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-143-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-144-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-145-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-161-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-147-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-148-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-149-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-160-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-151-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-153-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-154-0x00000000012B0000-0x00000000015CF000-memory.dmpFilesize
3.1MB
-
memory/2748-152-0x0000000000900000-0x0000000000A4A000-memory.dmpFilesize
1.3MB
-
memory/2748-155-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-156-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-157-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-121-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-122-0x00000000012B0000-0x00000000015CF000-memory.dmpFilesize
3.1MB
-
memory/2748-159-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-146-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-162-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-163-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-164-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-165-0x00000000012B1000-0x00000000012B3000-memory.dmpFilesize
8KB
-
memory/2748-166-0x00000000012B1000-0x00000000012B3000-memory.dmpFilesize
8KB
-
memory/2748-167-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-168-0x00000000012B0000-0x00000000015CF000-memory.dmpFilesize
3.1MB
-
memory/2748-169-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/2748-189-0x00000000012B0000-0x00000000015CF000-memory.dmpFilesize
3.1MB
-
memory/2748-120-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3344-233-0x0000000000C40000-0x0000000000C84000-memory.dmpFilesize
272KB
-
memory/3344-260-0x00000000010B0000-0x00000000013CF000-memory.dmpFilesize
3.1MB
-
memory/3344-259-0x0000000000C40000-0x0000000000C84000-memory.dmpFilesize
272KB
-
memory/3344-258-0x00000000010B0000-0x00000000013CF000-memory.dmpFilesize
3.1MB
-
memory/3344-201-0x00000000010B0000-0x00000000013CF000-memory.dmpFilesize
3.1MB
-
memory/3344-235-0x00000000010B0000-0x00000000013CF000-memory.dmpFilesize
3.1MB
-
memory/3344-234-0x00000000010B0000-0x00000000013CF000-memory.dmpFilesize
3.1MB
-
memory/3548-185-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-177-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-178-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-179-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-181-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-180-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-182-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-176-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-175-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-174-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-173-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-172-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-171-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-170-0x0000000000000000-mapping.dmp
-
memory/3548-184-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-183-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-186-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-187-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB
-
memory/3548-188-0x0000000077660000-0x00000000777EE000-memory.dmpFilesize
1.6MB