Analysis
-
max time kernel
94s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 05:07
Static task
static1
General
-
Target
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe
-
Size
1.8MB
-
MD5
57bd0f24135ce0f153457d92c67ca3f4
-
SHA1
137da7b2d8ad6f977fa552d07c70b1dc02a2e565
-
SHA256
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e
-
SHA512
52c7cb0ecf861093ca3fd6431031b768720350f2d19f3e679c7e4fb0ea549317d54820bec2c8f6cf711b0590747bc686f7dee7579242663664091be648404a05
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 688 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
oobeldr.exedac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exeoobeldr.exepid process 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 688 oobeldr.exe 688 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5056 schtasks.exe 3724 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exeoobeldr.exepid process 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe 688 oobeldr.exe 688 oobeldr.exe 688 oobeldr.exe 688 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exeoobeldr.exedescription pid process target process PID 4824 wrote to memory of 5056 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe schtasks.exe PID 4824 wrote to memory of 5056 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe schtasks.exe PID 4824 wrote to memory of 5056 4824 dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe schtasks.exe PID 688 wrote to memory of 3724 688 oobeldr.exe schtasks.exe PID 688 wrote to memory of 3724 688 oobeldr.exe schtasks.exe PID 688 wrote to memory of 3724 688 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe"C:\Users\Admin\AppData\Local\Temp\dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD557bd0f24135ce0f153457d92c67ca3f4
SHA1137da7b2d8ad6f977fa552d07c70b1dc02a2e565
SHA256dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e
SHA51252c7cb0ecf861093ca3fd6431031b768720350f2d19f3e679c7e4fb0ea549317d54820bec2c8f6cf711b0590747bc686f7dee7579242663664091be648404a05
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
1.8MB
MD557bd0f24135ce0f153457d92c67ca3f4
SHA1137da7b2d8ad6f977fa552d07c70b1dc02a2e565
SHA256dac6dc38f7cbd0337407b34c9dff11b72e65df08637f18e450e02c5dcd23cf5e
SHA51252c7cb0ecf861093ca3fd6431031b768720350f2d19f3e679c7e4fb0ea549317d54820bec2c8f6cf711b0590747bc686f7dee7579242663664091be648404a05
-
memory/688-157-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/688-156-0x0000000002920000-0x0000000002964000-memory.dmpFilesize
272KB
-
memory/688-155-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/688-154-0x0000000077270000-0x0000000077413000-memory.dmpFilesize
1.6MB
-
memory/688-153-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/688-151-0x0000000000831000-0x0000000000833000-memory.dmpFilesize
8KB
-
memory/688-149-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/688-148-0x0000000002920000-0x0000000002964000-memory.dmpFilesize
272KB
-
memory/688-147-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/688-146-0x0000000000830000-0x0000000000B4F000-memory.dmpFilesize
3.1MB
-
memory/3724-152-0x0000000000000000-mapping.dmp
-
memory/4824-143-0x0000000077270000-0x0000000077413000-memory.dmpFilesize
1.6MB
-
memory/4824-142-0x00000000007F0000-0x0000000000B0F000-memory.dmpFilesize
3.1MB
-
memory/4824-141-0x0000000000B40000-0x0000000000B84000-memory.dmpFilesize
272KB
-
memory/4824-140-0x0000000077270000-0x0000000077413000-memory.dmpFilesize
1.6MB
-
memory/4824-139-0x00000000007F0000-0x0000000000B0F000-memory.dmpFilesize
3.1MB
-
memory/4824-132-0x00000000007F0000-0x0000000000B0F000-memory.dmpFilesize
3.1MB
-
memory/4824-137-0x00000000007F1000-0x00000000007F3000-memory.dmpFilesize
8KB
-
memory/4824-136-0x00000000007F1000-0x00000000007F3000-memory.dmpFilesize
8KB
-
memory/4824-135-0x00000000007F0000-0x0000000000B0F000-memory.dmpFilesize
3.1MB
-
memory/4824-134-0x0000000000B40000-0x0000000000B84000-memory.dmpFilesize
272KB
-
memory/4824-133-0x00000000007F0000-0x0000000000B0F000-memory.dmpFilesize
3.1MB
-
memory/5056-138-0x0000000000000000-mapping.dmp