Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2022, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe
Resource
win10v2004-20220812-en
General
-
Target
d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe
-
Size
322KB
-
MD5
1c358ba641409d7b9d2d7815b02b59c6
-
SHA1
860d2fa3b28b845bc6c553fff58b1ada400aedcb
-
SHA256
d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
-
SHA512
a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 448 oobeldr.exe 4088 oobeldr.exe 4256 oobeldr.exe 4660 oobeldr.exe 2488 oobeldr.exe 2172 oobeldr.exe 2036 oobeldr.exe 1708 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4676 set thread context of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 448 set thread context of 4088 448 oobeldr.exe 88 PID 4256 set thread context of 2172 4256 oobeldr.exe 98 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3204 schtasks.exe 224 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4676 wrote to memory of 4244 4676 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 81 PID 4244 wrote to memory of 3204 4244 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 82 PID 4244 wrote to memory of 3204 4244 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 82 PID 4244 wrote to memory of 3204 4244 d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe 82 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 448 wrote to memory of 4088 448 oobeldr.exe 88 PID 4088 wrote to memory of 224 4088 oobeldr.exe 91 PID 4088 wrote to memory of 224 4088 oobeldr.exe 91 PID 4088 wrote to memory of 224 4088 oobeldr.exe 91 PID 4256 wrote to memory of 4660 4256 oobeldr.exe 96 PID 4256 wrote to memory of 4660 4256 oobeldr.exe 96 PID 4256 wrote to memory of 4660 4256 oobeldr.exe 96 PID 4256 wrote to memory of 2488 4256 oobeldr.exe 97 PID 4256 wrote to memory of 2488 4256 oobeldr.exe 97 PID 4256 wrote to memory of 2488 4256 oobeldr.exe 97 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 4256 wrote to memory of 2172 4256 oobeldr.exe 98 PID 2036 wrote to memory of 1708 2036 oobeldr.exe 100 PID 2036 wrote to memory of 1708 2036 oobeldr.exe 100 PID 2036 wrote to memory of 1708 2036 oobeldr.exe 100 PID 2036 wrote to memory of 1688 2036 oobeldr.exe 101 PID 2036 wrote to memory of 1688 2036 oobeldr.exe 101 PID 2036 wrote to memory of 1688 2036 oobeldr.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe"C:\Users\Admin\AppData\Local\Temp\d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exeC:\Users\Admin\AppData\Local\Temp\d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3204
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:224
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4660
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2488
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2172
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1708
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵PID:1688
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD503d2df1e8834bc4ec1756735429b458c
SHA14ee6c0f5b04c8e0c5076219c5724032daab11d40
SHA256745ab70552d9a0463b791fd8dc1942838ac3e34fb1a68f09ed3766c7e3b05631
SHA5122482c3d4478125ccbc7f224f50e86b7bf925ed438b59f4dce57b9b6bcdb59df51417049096b131b6b911173550eed98bc92aba7050861de303a692f0681b197b
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe
-
Filesize
322KB
MD51c358ba641409d7b9d2d7815b02b59c6
SHA1860d2fa3b28b845bc6c553fff58b1ada400aedcb
SHA256d540d1a20e69803984f22ae1f6809dfad3ee35e50a6e551c24c8f1fa28b16f63
SHA512a115dbd79753c702dfd49162cb008f53f62a8bd12808c7f12e1ca86bb4e844dbf7e56816a57c33bc958a148a6ed368ed8627ef932e43b9ccc62cee4de4b89bbe