Analysis
-
max time kernel
52s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2022 04:53
Static task
static1
General
-
Target
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe
-
Size
1.8MB
-
MD5
1265b2fd2b3d884c42350b3e3257d275
-
SHA1
d5473222e9f119310edce422eed42af416b8c6a7
-
SHA256
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287
-
SHA512
c351b47c66ea3a6cd70d1b9a9ff8999b2245d85179525a8f70cae326f2252524ac896b9b664507d93eeb83559b4696c2d5365d59b88c8b7acc82a6c6dc633a3a
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 3496 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exepid process 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 3496 oobeldr.exe 3496 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2980 schtasks.exe 4292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exepid process 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe 3496 oobeldr.exe 3496 oobeldr.exe 3496 oobeldr.exe 3496 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exeoobeldr.exedescription pid process target process PID 2492 wrote to memory of 2980 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe schtasks.exe PID 2492 wrote to memory of 2980 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe schtasks.exe PID 2492 wrote to memory of 2980 2492 50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe schtasks.exe PID 3496 wrote to memory of 4292 3496 oobeldr.exe schtasks.exe PID 3496 wrote to memory of 4292 3496 oobeldr.exe schtasks.exe PID 3496 wrote to memory of 4292 3496 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe"C:\Users\Admin\AppData\Local\Temp\50b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD51265b2fd2b3d884c42350b3e3257d275
SHA1d5473222e9f119310edce422eed42af416b8c6a7
SHA25650b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287
SHA512c351b47c66ea3a6cd70d1b9a9ff8999b2245d85179525a8f70cae326f2252524ac896b9b664507d93eeb83559b4696c2d5365d59b88c8b7acc82a6c6dc633a3a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD51265b2fd2b3d884c42350b3e3257d275
SHA1d5473222e9f119310edce422eed42af416b8c6a7
SHA25650b3a380437c7ace33eb48ca775d7f6a1e291c3438ac48223a33e4d666381287
SHA512c351b47c66ea3a6cd70d1b9a9ff8999b2245d85179525a8f70cae326f2252524ac896b9b664507d93eeb83559b4696c2d5365d59b88c8b7acc82a6c6dc633a3a
-
memory/2492-158-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-154-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-122-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-123-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-124-0x00000000012C0000-0x00000000015DF000-memory.dmpFilesize
3.1MB
-
memory/2492-125-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-126-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-127-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-128-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-129-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-130-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-131-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-132-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-133-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-134-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-135-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-136-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-137-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-139-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-140-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-138-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-142-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-141-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-143-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-144-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-145-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-146-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-147-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-148-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-120-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-149-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-151-0x00000000012C0000-0x00000000015DF000-memory.dmpFilesize
3.1MB
-
memory/2492-152-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-153-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-160-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-155-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-157-0x00000000012C0000-0x00000000015DF000-memory.dmpFilesize
3.1MB
-
memory/2492-156-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-150-0x0000000000EE0000-0x0000000000F24000-memory.dmpFilesize
272KB
-
memory/2492-159-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-121-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-161-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-162-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-163-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-164-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-165-0x00000000012C1000-0x00000000012C3000-memory.dmpFilesize
8KB
-
memory/2492-166-0x00000000012C1000-0x00000000012C3000-memory.dmpFilesize
8KB
-
memory/2492-167-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-168-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2492-174-0x00000000012C0000-0x00000000015DF000-memory.dmpFilesize
3.1MB
-
memory/2492-189-0x00000000012C0000-0x00000000015DF000-memory.dmpFilesize
3.1MB
-
memory/2492-190-0x0000000000EE0000-0x0000000000F24000-memory.dmpFilesize
272KB
-
memory/2980-188-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-171-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-182-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-184-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-173-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-175-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-176-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-177-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-178-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-179-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-180-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-170-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-183-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-181-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-172-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-185-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-186-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-187-0x0000000077D90000-0x0000000077F1E000-memory.dmpFilesize
1.6MB
-
memory/2980-169-0x0000000000000000-mapping.dmp
-
memory/3496-205-0x00000000009A0000-0x0000000000CBF000-memory.dmpFilesize
3.1MB
-
memory/3496-250-0x0000000002D60000-0x0000000002DA4000-memory.dmpFilesize
272KB
-
memory/3496-255-0x00000000009A0000-0x0000000000CBF000-memory.dmpFilesize
3.1MB
-
memory/3496-258-0x00000000009A0000-0x0000000000CBF000-memory.dmpFilesize
3.1MB
-
memory/3496-259-0x0000000002D60000-0x0000000002DA4000-memory.dmpFilesize
272KB
-
memory/3496-260-0x00000000009A0000-0x0000000000CBF000-memory.dmpFilesize
3.1MB
-
memory/4292-237-0x0000000000000000-mapping.dmp