Analysis
-
max time kernel
51s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-10-2022 17:13
Static task
static1
General
-
Target
e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe
-
Size
1.8MB
-
MD5
9ccb9bf467d3be473a5db776515a3e1c
-
SHA1
ebad1758644349d1001aefa5f1b9e042b3af5772
-
SHA256
e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00
-
SHA512
eeb44e7529389ebeec1c68cd6109930227b0bda2545a656be7bb650fa0cc510364a12bca7b7dd10f43fa05dfea126ededa9d09db0726dcf7e11da27955270f56
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 4028 oobeldr.exe 4028 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4808 schtasks.exe 1152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 4028 oobeldr.exe 4028 oobeldr.exe 4028 oobeldr.exe 4028 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4808 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 66 PID 2692 wrote to memory of 4808 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 66 PID 2692 wrote to memory of 4808 2692 e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe 66 PID 4028 wrote to memory of 1152 4028 oobeldr.exe 69 PID 4028 wrote to memory of 1152 4028 oobeldr.exe 69 PID 4028 wrote to memory of 1152 4028 oobeldr.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe"C:\Users\Admin\AppData\Local\Temp\e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:4808
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
PID:1152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59ccb9bf467d3be473a5db776515a3e1c
SHA1ebad1758644349d1001aefa5f1b9e042b3af5772
SHA256e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00
SHA512eeb44e7529389ebeec1c68cd6109930227b0bda2545a656be7bb650fa0cc510364a12bca7b7dd10f43fa05dfea126ededa9d09db0726dcf7e11da27955270f56
-
Filesize
1.8MB
MD59ccb9bf467d3be473a5db776515a3e1c
SHA1ebad1758644349d1001aefa5f1b9e042b3af5772
SHA256e9c32bff5f05f026577d43b5d8e7fb071fedbf491ed1dd246d3c7f9be8a4ca00
SHA512eeb44e7529389ebeec1c68cd6109930227b0bda2545a656be7bb650fa0cc510364a12bca7b7dd10f43fa05dfea126ededa9d09db0726dcf7e11da27955270f56