Analysis
-
max time kernel
62s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2022, 09:43
Static task
static1
General
-
Target
d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe
-
Size
1.8MB
-
MD5
7f76f6f537b112e19854685003948cb5
-
SHA1
14ddfe9e3ff28043de89f48bd58bb48d72e0d25d
-
SHA256
d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e
-
SHA512
dada0cdeab38d599bcd25f206de60cdb68e131a1dcda187d9175fae8b1db816ef409265cc6d1615618fd83b445c765236708a6e96de61ecf4d66494b103f5c0d
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2000 oobeldr.exe 2000 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3752 schtasks.exe 3760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 2000 oobeldr.exe 2000 oobeldr.exe 2000 oobeldr.exe 2000 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3760 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 66 PID 2580 wrote to memory of 3760 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 66 PID 2580 wrote to memory of 3760 2580 d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe 66 PID 2000 wrote to memory of 3752 2000 oobeldr.exe 69 PID 2000 wrote to memory of 3752 2000 oobeldr.exe 69 PID 2000 wrote to memory of 3752 2000 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe"C:\Users\Admin\AppData\Local\Temp\d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3760
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD57f76f6f537b112e19854685003948cb5
SHA114ddfe9e3ff28043de89f48bd58bb48d72e0d25d
SHA256d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e
SHA512dada0cdeab38d599bcd25f206de60cdb68e131a1dcda187d9175fae8b1db816ef409265cc6d1615618fd83b445c765236708a6e96de61ecf4d66494b103f5c0d
-
Filesize
1.8MB
MD57f76f6f537b112e19854685003948cb5
SHA114ddfe9e3ff28043de89f48bd58bb48d72e0d25d
SHA256d946f45536926aaf2a60c73c6843eb96ce4eab84231dabc313a250dba395b79e
SHA512dada0cdeab38d599bcd25f206de60cdb68e131a1dcda187d9175fae8b1db816ef409265cc6d1615618fd83b445c765236708a6e96de61ecf4d66494b103f5c0d