Analysis Overview
SHA256
e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94
Threat Level: Likely malicious
The file e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 was found to be: Likely malicious.
Malicious Activity Summary
Executes dropped EXE
Suspicious use of SetThreadContext
Suspicious use of WriteProcessMemory
Creates scheduled task(s)
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-11-01 11:36
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-11-01 11:36
Reported
2022-11-01 11:39
Platform
win10-20220812-en
Max time kernel
145s
Max time network
147s
Command Line
Signatures
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3676 set thread context of 4852 | N/A | C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe | C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe |
| PID 4916 set thread context of 4856 | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe |
| PID 3788 set thread context of 4532 | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe |
| PID 3172 set thread context of 2412 | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe |
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\schtasks.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
"C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe"
C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
C:\Users\Admin\AppData\Local\Temp\e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Windows\SysWOW64\schtasks.exe
/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
Network
| Country | Destination | Domain | Proto |
| US | 52.182.143.211:443 | tcp | |
| US | 209.197.3.8:80 | tcp |
Files
memory/3676-119-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-118-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-121-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-123-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-122-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-120-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-124-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-125-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-127-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-130-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-131-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-132-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-129-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-128-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-126-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-133-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-135-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-136-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-139-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-138-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-141-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-140-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-142-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-137-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-143-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-144-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-145-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-134-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-146-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-147-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-148-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-149-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-150-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-152-0x0000000000AB0000-0x0000000000B06000-memory.dmp
memory/3676-154-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-153-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-151-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-155-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-157-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-158-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-156-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-159-0x00000000077C0000-0x000000000788C000-memory.dmp
memory/3676-160-0x0000000007D90000-0x000000000828E000-memory.dmp
memory/3676-161-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-162-0x0000000007930000-0x00000000079C2000-memory.dmp
memory/3676-163-0x0000000005310000-0x0000000005316000-memory.dmp
memory/3676-164-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-165-0x0000000007BD0000-0x0000000007C46000-memory.dmp
memory/3676-166-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-167-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-168-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-169-0x00000000078C0000-0x00000000078DE000-memory.dmp
memory/3676-173-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-175-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-174-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-172-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-171-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-170-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-179-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-182-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-180-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/3676-181-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-184-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-186-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-189-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-188-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-187-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-185-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-178-0x0000000077A40000-0x0000000077BCE000-memory.dmp
memory/4852-177-0x0000000000402354-mapping.dmp
memory/4852-176-0x0000000000400000-0x0000000000406000-memory.dmp
memory/3628-211-0x0000000000000000-mapping.dmp
memory/4852-216-0x0000000000400000-0x0000000000406000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
memory/4856-287-0x0000000000402354-mapping.dmp
memory/3664-321-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
| MD5 | db5ef8d7c51bad129d9097bf953e4913 |
| SHA1 | 8439db960aa2d431bf5ec3c37af775b45eb07e06 |
| SHA256 | 1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9 |
| SHA512 | 04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee |
memory/4532-394-0x0000000000402354-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |
memory/2412-481-0x0000000000402354-mapping.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
| MD5 | f6cf9897942e0ae620d06be6858bbdf0 |
| SHA1 | 0f878b006f1258033c8ef3c7a10b980f1545be73 |
| SHA256 | e795f2169c7fa609a840e4b042597bb4a0c9fee4fe280d233780fab546288d94 |
| SHA512 | f0ea1cba8d3afdffee11ee27936bbbfc5f05223f0fce95b814b2ed0b4f433336b746bcd7d83aa0e0eb6201e7a5018e5d2c677e7ce4191ffeb264ea1e991a8b2d |