Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 23:55
Static task
static1
Behavioral task
behavioral1
Sample
028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe
Resource
win10-20220812-en
General
-
Target
028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe
-
Size
322KB
-
MD5
470bfceea0a73217ef0dbd446d32807b
-
SHA1
8e3f3773ddefc13de253471f1cd916388f706574
-
SHA256
028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
-
SHA512
67624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4300 oobeldr.exe 3016 oobeldr.exe 2572 oobeldr.exe 1352 oobeldr.exe 188 oobeldr.exe 2856 oobeldr.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3824 set thread context of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 4300 set thread context of 3016 4300 oobeldr.exe 70 PID 2572 set thread context of 1352 2572 oobeldr.exe 74 PID 188 set thread context of 2856 188 oobeldr.exe 76 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4272 schtasks.exe 4276 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 3824 wrote to memory of 4960 3824 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 66 PID 4960 wrote to memory of 4272 4960 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 67 PID 4960 wrote to memory of 4272 4960 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 67 PID 4960 wrote to memory of 4272 4960 028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe 67 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 4300 wrote to memory of 3016 4300 oobeldr.exe 70 PID 3016 wrote to memory of 4276 3016 oobeldr.exe 71 PID 3016 wrote to memory of 4276 3016 oobeldr.exe 71 PID 3016 wrote to memory of 4276 3016 oobeldr.exe 71 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 2572 wrote to memory of 1352 2572 oobeldr.exe 74 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76 PID 188 wrote to memory of 2856 188 oobeldr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe"C:\Users\Admin\AppData\Local\Temp\028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exeC:\Users\Admin\AppData\Local\Temp\028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4272
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4276
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:188 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2856
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876
-
Filesize
322KB
MD5470bfceea0a73217ef0dbd446d32807b
SHA18e3f3773ddefc13de253471f1cd916388f706574
SHA256028b888ba0f11bf976c79d0e7e79321aaa4b6b479879206b6dc7a125d6310480
SHA51267624dc69c98124704689d0ac93595dd9d599ebf4857fc226512c9e6e43d792e6ebc395fa4159038b68e69a21c4852f9c3597b4690c855a8c47d4caeed705876