Analysis
-
max time kernel
58s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 16:36
Static task
static1
General
-
Target
4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe
-
Size
1.8MB
-
MD5
31635a5fd0069116dab027ce4655575f
-
SHA1
38d25edda95e848956a7f7ad10861bd6eb7e9c84
-
SHA256
4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12
-
SHA512
7065bcbe101def0c2b5b13c75d38a27e8a335923195cf1d5d917fe5a06121fe2f761136e9373a3a49fc81b27487c19a3498b13d20759ec78c856d3c94cef34ee
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4304 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4304 oobeldr.exe 4304 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4208 schtasks.exe 3512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 4304 oobeldr.exe 4304 oobeldr.exe 4304 oobeldr.exe 4304 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3512 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 66 PID 4544 wrote to memory of 3512 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 66 PID 4544 wrote to memory of 3512 4544 4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe 66 PID 4304 wrote to memory of 4208 4304 oobeldr.exe 69 PID 4304 wrote to memory of 4208 4304 oobeldr.exe 69 PID 4304 wrote to memory of 4208 4304 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe"C:\Users\Admin\AppData\Local\Temp\4f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3512
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4208
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD531635a5fd0069116dab027ce4655575f
SHA138d25edda95e848956a7f7ad10861bd6eb7e9c84
SHA2564f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12
SHA5127065bcbe101def0c2b5b13c75d38a27e8a335923195cf1d5d917fe5a06121fe2f761136e9373a3a49fc81b27487c19a3498b13d20759ec78c856d3c94cef34ee
-
Filesize
1.8MB
MD531635a5fd0069116dab027ce4655575f
SHA138d25edda95e848956a7f7ad10861bd6eb7e9c84
SHA2564f383ba16164b64ee24551e57272e00f3790676c5fb8ac77b4efb8505e267d12
SHA5127065bcbe101def0c2b5b13c75d38a27e8a335923195cf1d5d917fe5a06121fe2f761136e9373a3a49fc81b27487c19a3498b13d20759ec78c856d3c94cef34ee