Analysis
-
max time kernel
91s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 13:26
Static task
static1
General
-
Target
15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe
-
Size
1.8MB
-
MD5
aebde82c0a72cce1dfe6cbc5a7136a03
-
SHA1
765f4a5f4e92c35856ce2672fe9e37c0d0ac0355
-
SHA256
15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d
-
SHA512
80e5f59b2787abe8fe2206e6927ed3b575d85d8ac03074cc6d045a3171720e26f563918d130d62267cc10858e1c12099380ddc09a0651e4ffc43cf3c987e45d5
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 1188 oobeldr.exe 1188 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4820 schtasks.exe 3224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 1188 oobeldr.exe 1188 oobeldr.exe 1188 oobeldr.exe 1188 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4820 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 82 PID 4968 wrote to memory of 4820 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 82 PID 4968 wrote to memory of 4820 4968 15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe 82 PID 1188 wrote to memory of 3224 1188 oobeldr.exe 92 PID 1188 wrote to memory of 3224 1188 oobeldr.exe 92 PID 1188 wrote to memory of 3224 1188 oobeldr.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe"C:\Users\Admin\AppData\Local\Temp\15473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4820
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5aebde82c0a72cce1dfe6cbc5a7136a03
SHA1765f4a5f4e92c35856ce2672fe9e37c0d0ac0355
SHA25615473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d
SHA51280e5f59b2787abe8fe2206e6927ed3b575d85d8ac03074cc6d045a3171720e26f563918d130d62267cc10858e1c12099380ddc09a0651e4ffc43cf3c987e45d5
-
Filesize
1.8MB
MD5aebde82c0a72cce1dfe6cbc5a7136a03
SHA1765f4a5f4e92c35856ce2672fe9e37c0d0ac0355
SHA25615473e6805c0ce3fc582c63e40fd4b5291c4c366811c2ec8d96621e10fff946d
SHA51280e5f59b2787abe8fe2206e6927ed3b575d85d8ac03074cc6d045a3171720e26f563918d130d62267cc10858e1c12099380ddc09a0651e4ffc43cf3c987e45d5