Analysis
-
max time kernel
153s -
max time network
185s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31/10/2022, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe
Resource
win10-20220812-en
General
-
Target
5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe
-
Size
321KB
-
MD5
dc44b5354ac1d46ed532c0e7ff6a75e7
-
SHA1
f25de79d341b2335176c48769a941d5b8c9a2ec6
-
SHA256
5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
-
SHA512
27df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4916 oobeldr.exe 3528 oobeldr.exe 3852 oobeldr.exe 516 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2548 set thread context of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 4916 set thread context of 3528 4916 oobeldr.exe 70 PID 3852 set thread context of 516 3852 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe 3988 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 2548 wrote to memory of 4804 2548 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 66 PID 4804 wrote to memory of 2904 4804 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 67 PID 4804 wrote to memory of 2904 4804 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 67 PID 4804 wrote to memory of 2904 4804 5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe 67 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 4916 wrote to memory of 3528 4916 oobeldr.exe 70 PID 3528 wrote to memory of 3988 3528 oobeldr.exe 71 PID 3528 wrote to memory of 3988 3528 oobeldr.exe 71 PID 3528 wrote to memory of 3988 3528 oobeldr.exe 71 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74 PID 3852 wrote to memory of 516 3852 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe"C:\Users\Admin\AppData\Local\Temp\5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exeC:\Users\Admin\AppData\Local\Temp\5853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2904
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3988
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:516
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
321KB
MD5dc44b5354ac1d46ed532c0e7ff6a75e7
SHA1f25de79d341b2335176c48769a941d5b8c9a2ec6
SHA2565853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
SHA51227df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1
-
Filesize
321KB
MD5dc44b5354ac1d46ed532c0e7ff6a75e7
SHA1f25de79d341b2335176c48769a941d5b8c9a2ec6
SHA2565853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
SHA51227df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1
-
Filesize
321KB
MD5dc44b5354ac1d46ed532c0e7ff6a75e7
SHA1f25de79d341b2335176c48769a941d5b8c9a2ec6
SHA2565853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
SHA51227df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1
-
Filesize
321KB
MD5dc44b5354ac1d46ed532c0e7ff6a75e7
SHA1f25de79d341b2335176c48769a941d5b8c9a2ec6
SHA2565853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
SHA51227df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1
-
Filesize
321KB
MD5dc44b5354ac1d46ed532c0e7ff6a75e7
SHA1f25de79d341b2335176c48769a941d5b8c9a2ec6
SHA2565853617e029f473d66ebd62f8194fee92fcaba59f00a859145ca8289ec910d68
SHA51227df0305e40c807d351a5a91bc74b6e1e6622f0e7e0b6e61d21b7c6b149aaa7ab72b9cfa97cd5deca26ac9ce1f6817ca16700950f709510ba47273f618a60ed1