Analysis
-
max time kernel
157s -
max time network
85s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31-10-2022 19:03
Static task
static1
Behavioral task
behavioral1
Sample
ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe
Resource
win10-20220812-en
General
-
Target
ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe
-
Size
321KB
-
MD5
875ec2b3f4ddfc73dc32436fca1628b7
-
SHA1
9ce365e6b9c78e13fecc1472a740df5fb76b72a5
-
SHA256
ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
-
SHA512
533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 4072 oobeldr.exe 4996 oobeldr.exe 5116 oobeldr.exe 4980 oobeldr.exe 3908 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2584 set thread context of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 4072 set thread context of 5116 4072 oobeldr.exe 71 PID 4980 set thread context of 3908 4980 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3188 schtasks.exe 3384 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 2584 wrote to memory of 4796 2584 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 66 PID 4796 wrote to memory of 3384 4796 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 67 PID 4796 wrote to memory of 3384 4796 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 67 PID 4796 wrote to memory of 3384 4796 ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe 67 PID 4072 wrote to memory of 4996 4072 oobeldr.exe 70 PID 4072 wrote to memory of 4996 4072 oobeldr.exe 70 PID 4072 wrote to memory of 4996 4072 oobeldr.exe 70 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 4072 wrote to memory of 5116 4072 oobeldr.exe 71 PID 5116 wrote to memory of 3188 5116 oobeldr.exe 72 PID 5116 wrote to memory of 3188 5116 oobeldr.exe 72 PID 5116 wrote to memory of 3188 5116 oobeldr.exe 72 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75 PID 4980 wrote to memory of 3908 4980 oobeldr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe"C:\Users\Admin\AppData\Local\Temp\ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exeC:\Users\Admin\AppData\Local\Temp\ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3384
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4996
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3188
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:3908
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe
-
Filesize
321KB
MD5875ec2b3f4ddfc73dc32436fca1628b7
SHA19ce365e6b9c78e13fecc1472a740df5fb76b72a5
SHA256ac9e713999d361838983574dfbef521a0f12779066574c7976054bded650eb31
SHA512533863b3c8fd620a727d347dc3b11925655ceb37de2d6377adb8de78637fddec8ab7fe4266ced8bd3b4669157e9257fc148a01db830aaf50572821abe69942fe