Analysis
-
max time kernel
114s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe
Resource
win10-20220901-en
General
-
Target
0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe
-
Size
322KB
-
MD5
53bd72b1d495f41d9eb8e017217fed60
-
SHA1
3837cfc1d0e16660c8a69fb77c5e67b1b20a4812
-
SHA256
0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
-
SHA512
81188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5104 oobeldr.exe 4780 oobeldr.exe 4652 oobeldr.exe 444 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3504 set thread context of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 5104 set thread context of 4780 5104 oobeldr.exe 70 PID 4652 set thread context of 444 4652 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 772 schtasks.exe 4604 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 3504 wrote to memory of 2940 3504 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 66 PID 2940 wrote to memory of 772 2940 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 67 PID 2940 wrote to memory of 772 2940 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 67 PID 2940 wrote to memory of 772 2940 0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe 67 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 5104 wrote to memory of 4780 5104 oobeldr.exe 70 PID 4780 wrote to memory of 4604 4780 oobeldr.exe 71 PID 4780 wrote to memory of 4604 4780 oobeldr.exe 71 PID 4780 wrote to memory of 4604 4780 oobeldr.exe 71 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74 PID 4652 wrote to memory of 444 4652 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe"C:\Users\Admin\AppData\Local\Temp\0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exeC:\Users\Admin\AppData\Local\Temp\0385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:772
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4604
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:444
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
322KB
MD553bd72b1d495f41d9eb8e017217fed60
SHA13837cfc1d0e16660c8a69fb77c5e67b1b20a4812
SHA2560385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
SHA51281188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a
-
Filesize
322KB
MD553bd72b1d495f41d9eb8e017217fed60
SHA13837cfc1d0e16660c8a69fb77c5e67b1b20a4812
SHA2560385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
SHA51281188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a
-
Filesize
322KB
MD553bd72b1d495f41d9eb8e017217fed60
SHA13837cfc1d0e16660c8a69fb77c5e67b1b20a4812
SHA2560385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
SHA51281188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a
-
Filesize
322KB
MD553bd72b1d495f41d9eb8e017217fed60
SHA13837cfc1d0e16660c8a69fb77c5e67b1b20a4812
SHA2560385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
SHA51281188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a
-
Filesize
322KB
MD553bd72b1d495f41d9eb8e017217fed60
SHA13837cfc1d0e16660c8a69fb77c5e67b1b20a4812
SHA2560385bea8aa54b17152e14ab3641a1732dea487310098e620761c2575f322d006
SHA51281188eb27443c74464e180a9c73445bd55aecf2832c2f4d147f7dff7cbff72a01e44dd03f47f300d44aaae5d829bd4adb204766d8a6f2d0e7e424f5e6b00157a