Analysis
-
max time kernel
61s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-10-2022 00:59
Static task
static1
General
-
Target
429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe
-
Size
1.8MB
-
MD5
55efd4381a479c72a9c73aaf83cab70c
-
SHA1
3f691d25be6e03145a5fbd3189d345d66558444c
-
SHA256
429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044
-
SHA512
a9df3f7178ba9e2ed0f7b665c8eef48edecaf5d9be600c3f9ec72bb77bae3768b76c372ea3d79b6db96d0c1d8fcf910fe9397370cd4916af0d5fa1c6574a6160
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 1144 oobeldr.exe 1144 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3528 schtasks.exe 4388 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 1144 oobeldr.exe 1144 oobeldr.exe 1144 oobeldr.exe 1144 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2628 wrote to memory of 3528 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 66 PID 2628 wrote to memory of 3528 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 66 PID 2628 wrote to memory of 3528 2628 429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe 66 PID 1144 wrote to memory of 4388 1144 oobeldr.exe 69 PID 1144 wrote to memory of 4388 1144 oobeldr.exe 69 PID 1144 wrote to memory of 4388 1144 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe"C:\Users\Admin\AppData\Local\Temp\429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:3528
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD555efd4381a479c72a9c73aaf83cab70c
SHA13f691d25be6e03145a5fbd3189d345d66558444c
SHA256429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044
SHA512a9df3f7178ba9e2ed0f7b665c8eef48edecaf5d9be600c3f9ec72bb77bae3768b76c372ea3d79b6db96d0c1d8fcf910fe9397370cd4916af0d5fa1c6574a6160
-
Filesize
1.8MB
MD555efd4381a479c72a9c73aaf83cab70c
SHA13f691d25be6e03145a5fbd3189d345d66558444c
SHA256429f1d467306e151da9b18829be1d8e2f07f76e9b45127491ea101037cede044
SHA512a9df3f7178ba9e2ed0f7b665c8eef48edecaf5d9be600c3f9ec72bb77bae3768b76c372ea3d79b6db96d0c1d8fcf910fe9397370cd4916af0d5fa1c6574a6160