Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/11/2022, 23:22

General

  • Target

    e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe

  • Size

    325KB

  • MD5

    c6414c7912df5e8839a1c61ac579e10b

  • SHA1

    4f5b586e5e7f63da2f02ef736f05210606c9ab2b

  • SHA256

    e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

  • SHA512

    2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe
    "C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe
      C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe
      2⤵
        PID:1264
      • C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe
        C:\Users\Admin\AppData\Local\Temp\e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4556
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4768
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3816
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:5020
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:4984

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

            Filesize

            789B

            MD5

            db5ef8d7c51bad129d9097bf953e4913

            SHA1

            8439db960aa2d431bf5ec3c37af775b45eb07e06

            SHA256

            1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

            SHA512

            04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            325KB

            MD5

            c6414c7912df5e8839a1c61ac579e10b

            SHA1

            4f5b586e5e7f63da2f02ef736f05210606c9ab2b

            SHA256

            e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

            SHA512

            2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            325KB

            MD5

            c6414c7912df5e8839a1c61ac579e10b

            SHA1

            4f5b586e5e7f63da2f02ef736f05210606c9ab2b

            SHA256

            e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

            SHA512

            2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            325KB

            MD5

            c6414c7912df5e8839a1c61ac579e10b

            SHA1

            4f5b586e5e7f63da2f02ef736f05210606c9ab2b

            SHA256

            e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

            SHA512

            2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            325KB

            MD5

            c6414c7912df5e8839a1c61ac579e10b

            SHA1

            4f5b586e5e7f63da2f02ef736f05210606c9ab2b

            SHA256

            e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

            SHA512

            2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            325KB

            MD5

            c6414c7912df5e8839a1c61ac579e10b

            SHA1

            4f5b586e5e7f63da2f02ef736f05210606c9ab2b

            SHA256

            e2a0d0fa89f8c4342f6e78555178e23b3d8949d73fc714ff24216ee6044dabab

            SHA512

            2b36747ecba4d600273cddf8f46f04247ca2e57631ed58f7b480eae0ddd127c2e495abdb750be123de0e0b1ddc8bccc31defe71d94a195ed976783c9961e0002

          • memory/4556-191-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-187-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-212-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/4556-178-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/4556-190-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-189-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-188-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-186-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-182-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-184-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-181-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4556-180-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-140-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-172-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-143-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-144-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-145-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-146-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-147-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-148-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-149-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-150-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-151-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-152-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-153-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-154-0x0000000000C40000-0x0000000000C96000-memory.dmp

            Filesize

            344KB

          • memory/4944-155-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-156-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-157-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-158-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-159-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-160-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-161-0x00000000079A0000-0x0000000007A6C000-memory.dmp

            Filesize

            816KB

          • memory/4944-162-0x0000000007F70000-0x000000000846E000-memory.dmp

            Filesize

            5.0MB

          • memory/4944-163-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-164-0x0000000007A70000-0x0000000007B02000-memory.dmp

            Filesize

            584KB

          • memory/4944-165-0x0000000005490000-0x0000000005496000-memory.dmp

            Filesize

            24KB

          • memory/4944-166-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-167-0x0000000007D90000-0x0000000007E06000-memory.dmp

            Filesize

            472KB

          • memory/4944-168-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-169-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-170-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-171-0x00000000054E0000-0x00000000054FE000-memory.dmp

            Filesize

            120KB

          • memory/4944-142-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-173-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-174-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-175-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-176-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-177-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-141-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-120-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-139-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-138-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-183-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-137-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-136-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-135-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-134-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-133-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-132-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-131-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-130-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-129-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-128-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-127-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-126-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-125-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-124-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-121-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-123-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB

          • memory/4944-122-0x0000000077D50000-0x0000000077EDE000-memory.dmp

            Filesize

            1.6MB