Analysis Overview
SHA256
277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791
Threat Level: Likely malicious
The file 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 was found to be: Likely malicious.
Malicious Activity Summary
Executes dropped EXE
Suspicious use of SetThreadContext
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-01 11:36
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-01 11:36
Reported
2022-11-01 11:38
Platform
win10-20220812-en
Max time kernel
118s
Max time network
72s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1524 set thread context of 3448 | N/A | C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe | C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe |
| PID 4384 set thread context of 4128 | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe |
| PID 4952 set thread context of 636 | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe
"C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe"
C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe
C:\Users\Admin\AppData\Local\Temp\277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
Network
| Country | Destination | Domain | Proto |
| NL | 52.178.17.3:443 | tcp | |
| US | 209.197.3.8:80 | tcp |
Files
memory/1524-116-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-117-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-118-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-119-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-120-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-121-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-122-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-123-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-124-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-126-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-125-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-127-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-128-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-129-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-130-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-131-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-132-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-133-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-134-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-135-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-136-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-138-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-139-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-137-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-140-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-141-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-142-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-143-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-144-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-145-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-146-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-147-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-148-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-150-0x0000000000560000-0x00000000005B6000-memory.dmp
memory/1524-151-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-152-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-149-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-153-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-155-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-156-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-154-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-157-0x0000000004EB0000-0x0000000004F7C000-memory.dmp
memory/1524-158-0x0000000007920000-0x0000000007E1E000-memory.dmp
memory/1524-159-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-160-0x0000000007500000-0x0000000007592000-memory.dmp
memory/1524-161-0x0000000007460000-0x0000000007466000-memory.dmp
memory/1524-162-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-163-0x00000000077A0000-0x0000000007816000-memory.dmp
memory/1524-164-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-166-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-165-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-167-0x00000000074B0000-0x00000000074CE000-memory.dmp
memory/1524-170-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-171-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-173-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-172-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-169-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-168-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-177-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-179-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-186-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-187-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-185-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-184-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-183-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1524-182-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-181-0x0000000077290000-0x000000007741E000-memory.dmp
memory/1104-209-0x0000000000000000-mapping.dmp
memory/3448-178-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-176-0x0000000077290000-0x000000007741E000-memory.dmp
memory/3448-175-0x0000000000402354-mapping.dmp
memory/3448-174-0x0000000000400000-0x0000000000406000-memory.dmp
memory/3448-227-0x0000000000400000-0x0000000000406000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | 0d865c9f7f06f0416eb2371531e7f1c5 |
| SHA1 | 86d55a284116895d3e13be3dadb3c904b31e3870 |
| SHA256 | 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 |
| SHA512 | ad94d9de5336dc1446a8e24a23c5f938b1c3dc14bbd1ddf5b7de611f8ce221049866635d1586121037e6cf81ebf884bda8beefba530e6154bf98452f0363e854 |
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | 0d865c9f7f06f0416eb2371531e7f1c5 |
| SHA1 | 86d55a284116895d3e13be3dadb3c904b31e3870 |
| SHA256 | 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 |
| SHA512 | ad94d9de5336dc1446a8e24a23c5f938b1c3dc14bbd1ddf5b7de611f8ce221049866635d1586121037e6cf81ebf884bda8beefba530e6154bf98452f0363e854 |
memory/4128-285-0x0000000000402354-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | 0d865c9f7f06f0416eb2371531e7f1c5 |
| SHA1 | 86d55a284116895d3e13be3dadb3c904b31e3870 |
| SHA256 | 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 |
| SHA512 | ad94d9de5336dc1446a8e24a23c5f938b1c3dc14bbd1ddf5b7de611f8ce221049866635d1586121037e6cf81ebf884bda8beefba530e6154bf98452f0363e854 |
memory/4960-319-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | 0d865c9f7f06f0416eb2371531e7f1c5 |
| SHA1 | 86d55a284116895d3e13be3dadb3c904b31e3870 |
| SHA256 | 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 |
| SHA512 | ad94d9de5336dc1446a8e24a23c5f938b1c3dc14bbd1ddf5b7de611f8ce221049866635d1586121037e6cf81ebf884bda8beefba530e6154bf98452f0363e854 |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
| MD5 | db5ef8d7c51bad129d9097bf953e4913 |
| SHA1 | 8439db960aa2d431bf5ec3c37af775b45eb07e06 |
| SHA256 | 1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9 |
| SHA512 | 04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee |
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | 0d865c9f7f06f0416eb2371531e7f1c5 |
| SHA1 | 86d55a284116895d3e13be3dadb3c904b31e3870 |
| SHA256 | 277e70a459d0276309fed8514f10393e6d4ab59069d7502176d886f462eaf791 |
| SHA512 | ad94d9de5336dc1446a8e24a23c5f938b1c3dc14bbd1ddf5b7de611f8ce221049866635d1586121037e6cf81ebf884bda8beefba530e6154bf98452f0363e854 |
memory/636-392-0x0000000000402354-mapping.dmp