Analysis
-
max time kernel
69s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11-10-2022 04:47
Behavioral task
behavioral1
Sample
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe
Resource
win7-20220812-en
General
-
Target
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe
-
Size
5.2MB
-
MD5
bcbb46256a4af7b5509b2924be449bc3
-
SHA1
1692917c482954c43a5b0127fc1b4c939fe7cbd2
-
SHA256
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
-
SHA512
4c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
SSDEEP
98304:z5E5IoBr0SdozMevlC5J0xTSdR7QISNVVhiiXk04QVKLg+5yG:z099ozMedC56SdR7QISNdk04JLp5yG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 2340 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
resource yara_rule behavioral2/memory/2500-117-0x0000000001360000-0x0000000001F02000-memory.dmp themida behavioral2/memory/2500-149-0x0000000001360000-0x0000000001F02000-memory.dmp themida behavioral2/memory/2500-150-0x0000000001360000-0x0000000001F02000-memory.dmp themida behavioral2/memory/2500-151-0x0000000001360000-0x0000000001F02000-memory.dmp themida behavioral2/memory/2500-153-0x0000000001360000-0x0000000001F02000-memory.dmp themida behavioral2/memory/2500-175-0x0000000001360000-0x0000000001F02000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe themida behavioral2/memory/2340-205-0x0000000000080000-0x0000000000C22000-memory.dmp themida behavioral2/memory/2340-233-0x0000000000080000-0x0000000000C22000-memory.dmp themida -
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exepid process 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 2340 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2100 schtasks.exe 3532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exepid process 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 2340 oobeldr.exe 2340 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription pid process target process PID 2500 wrote to memory of 2100 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 2500 wrote to memory of 2100 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 2500 wrote to memory of 2100 2500 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 2340 wrote to memory of 3532 2340 oobeldr.exe schtasks.exe PID 2340 wrote to memory of 3532 2340 oobeldr.exe schtasks.exe PID 2340 wrote to memory of 3532 2340 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe"C:\Users\Admin\AppData\Local\Temp\f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
5.2MB
MD5bcbb46256a4af7b5509b2924be449bc3
SHA11692917c482954c43a5b0127fc1b4c939fe7cbd2
SHA256f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
SHA5124c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
memory/2100-166-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-163-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-171-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-172-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-158-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-159-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-160-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-161-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-162-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-167-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-165-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-164-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-174-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-173-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-157-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-156-0x0000000000000000-mapping.dmp
-
memory/2100-170-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-169-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2100-168-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-179-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-181-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-233-0x0000000000080000-0x0000000000C22000-memory.dmpFilesize
11.6MB
-
memory/2340-177-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-178-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-205-0x0000000000080000-0x0000000000C22000-memory.dmpFilesize
11.6MB
-
memory/2340-180-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-182-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-183-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-185-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2340-184-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-135-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-117-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-150-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-151-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-152-0x0000000001361000-0x0000000001363000-memory.dmpFilesize
8KB
-
memory/2500-153-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-154-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-155-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-148-0x0000000001361000-0x0000000001363000-memory.dmpFilesize
8KB
-
memory/2500-147-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-146-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-145-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-144-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-143-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-142-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-141-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-140-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-139-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-138-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-137-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-136-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-149-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-134-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-133-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-132-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-131-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-130-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-175-0x0000000001360000-0x0000000001F02000-memory.dmpFilesize
11.6MB
-
memory/2500-129-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-128-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-127-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-126-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-125-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-124-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-123-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-122-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-121-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-120-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-119-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/2500-118-0x0000000077580000-0x000000007770E000-memory.dmpFilesize
1.6MB
-
memory/3532-214-0x0000000000000000-mapping.dmp