Analysis
-
max time kernel
98s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-11-2022 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe
Resource
win10-20220812-en
General
-
Target
d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe
-
Size
324KB
-
MD5
4f86a2022d240be91664bd8ddcf4c207
-
SHA1
dc064b31fdcc40d135015933f03bbfdbe5f44238
-
SHA256
d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
-
SHA512
f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 704 oobeldr.exe 3824 oobeldr.exe 4640 oobeldr.exe 1624 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2752 set thread context of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 704 set thread context of 3824 704 oobeldr.exe 71 PID 4640 set thread context of 1624 4640 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4300 schtasks.exe 1412 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3548 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 66 PID 2752 wrote to memory of 3548 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 66 PID 2752 wrote to memory of 3548 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 66 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 2752 wrote to memory of 4304 2752 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 67 PID 4304 wrote to memory of 4300 4304 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 68 PID 4304 wrote to memory of 4300 4304 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 68 PID 4304 wrote to memory of 4300 4304 d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe 68 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 704 wrote to memory of 3824 704 oobeldr.exe 71 PID 3824 wrote to memory of 1412 3824 oobeldr.exe 72 PID 3824 wrote to memory of 1412 3824 oobeldr.exe 72 PID 3824 wrote to memory of 1412 3824 oobeldr.exe 72 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75 PID 4640 wrote to memory of 1624 4640 oobeldr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe"C:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exeC:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe2⤵PID:3548
-
-
C:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exeC:\Users\Admin\AppData\Local\Temp\d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4300
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:1412
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
324KB
MD54f86a2022d240be91664bd8ddcf4c207
SHA1dc064b31fdcc40d135015933f03bbfdbe5f44238
SHA256d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
SHA512f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3
-
Filesize
324KB
MD54f86a2022d240be91664bd8ddcf4c207
SHA1dc064b31fdcc40d135015933f03bbfdbe5f44238
SHA256d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
SHA512f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3
-
Filesize
324KB
MD54f86a2022d240be91664bd8ddcf4c207
SHA1dc064b31fdcc40d135015933f03bbfdbe5f44238
SHA256d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
SHA512f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3
-
Filesize
324KB
MD54f86a2022d240be91664bd8ddcf4c207
SHA1dc064b31fdcc40d135015933f03bbfdbe5f44238
SHA256d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
SHA512f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3
-
Filesize
324KB
MD54f86a2022d240be91664bd8ddcf4c207
SHA1dc064b31fdcc40d135015933f03bbfdbe5f44238
SHA256d55195478a93369a4286da9f2cc742c5e6f0d467958dd9bc59615cefe0198061
SHA512f91292a535ce3bfb60a601e3a3f02a3ef9053c442be27905cd517b7a378e71b7e513d68642a21b378548f47c2168833235cf85d82098b968322c8cfa0204cde3