Analysis
-
max time kernel
50s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03-10-2022 19:29
Static task
static1
General
-
Target
d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe
-
Size
1.8MB
-
MD5
06eccd79e2276c2e3ff28f80e7e8e1a9
-
SHA1
dcf56e343d1773a54a4dd9b2d50c01d5ff41c67c
-
SHA256
d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a
-
SHA512
54dc9f656090b6cf3ac3ffe1336da7bee6ef5151a82efe8b6eaebec73556a38e69a3b548a0044dadd108447e29650086f202ef9138219779d171a57318910482
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 3856 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 3856 oobeldr.exe 3856 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2964 schtasks.exe 4448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 3856 oobeldr.exe 3856 oobeldr.exe 3856 oobeldr.exe 3856 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2964 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 66 PID 2792 wrote to memory of 2964 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 66 PID 2792 wrote to memory of 2964 2792 d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe 66 PID 3856 wrote to memory of 4448 3856 oobeldr.exe 69 PID 3856 wrote to memory of 4448 3856 oobeldr.exe 69 PID 3856 wrote to memory of 4448 3856 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe"C:\Users\Admin\AppData\Local\Temp\d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2964
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4448
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD506eccd79e2276c2e3ff28f80e7e8e1a9
SHA1dcf56e343d1773a54a4dd9b2d50c01d5ff41c67c
SHA256d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a
SHA51254dc9f656090b6cf3ac3ffe1336da7bee6ef5151a82efe8b6eaebec73556a38e69a3b548a0044dadd108447e29650086f202ef9138219779d171a57318910482
-
Filesize
1.8MB
MD506eccd79e2276c2e3ff28f80e7e8e1a9
SHA1dcf56e343d1773a54a4dd9b2d50c01d5ff41c67c
SHA256d5c807675ef0d70420f5d4141ec903b79a41fe30bb68096786a657358703988a
SHA51254dc9f656090b6cf3ac3ffe1336da7bee6ef5151a82efe8b6eaebec73556a38e69a3b548a0044dadd108447e29650086f202ef9138219779d171a57318910482