Analysis
-
max time kernel
70s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
05/10/2022, 14:11
Static task
static1
General
-
Target
334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe
-
Size
1.8MB
-
MD5
3871d3b95884c81129593bed107b6540
-
SHA1
a7fcbc9a40ae9f55ffa736e79820734b44ccfcb8
-
SHA256
334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954
-
SHA512
ab021a181fde81e8a6e7d8fc12e75fc1e979d08d6a70d88faf8ab708de908ef0cdf37e6d55f0e7a47c654fa0250ed57cceff4a61d0c2a90d1ce6d1d19f036d09
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 2976 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2976 oobeldr.exe 2976 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2780 schtasks.exe 3396 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 2976 oobeldr.exe 2976 oobeldr.exe 2976 oobeldr.exe 2976 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2780 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 66 PID 2492 wrote to memory of 2780 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 66 PID 2492 wrote to memory of 2780 2492 334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe 66 PID 2976 wrote to memory of 3396 2976 oobeldr.exe 69 PID 2976 wrote to memory of 3396 2976 oobeldr.exe 69 PID 2976 wrote to memory of 3396 2976 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe"C:\Users\Admin\AppData\Local\Temp\334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:2780
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD53871d3b95884c81129593bed107b6540
SHA1a7fcbc9a40ae9f55ffa736e79820734b44ccfcb8
SHA256334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954
SHA512ab021a181fde81e8a6e7d8fc12e75fc1e979d08d6a70d88faf8ab708de908ef0cdf37e6d55f0e7a47c654fa0250ed57cceff4a61d0c2a90d1ce6d1d19f036d09
-
Filesize
1.8MB
MD53871d3b95884c81129593bed107b6540
SHA1a7fcbc9a40ae9f55ffa736e79820734b44ccfcb8
SHA256334854e5a170c47e037ac5d6c7142f03016edc73a1f8f02101ee4259cf815954
SHA512ab021a181fde81e8a6e7d8fc12e75fc1e979d08d6a70d88faf8ab708de908ef0cdf37e6d55f0e7a47c654fa0250ed57cceff4a61d0c2a90d1ce6d1d19f036d09