Analysis
-
max time kernel
113s -
max time network
54s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe
Resource
win10-20220901-en
General
-
Target
f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe
-
Size
324KB
-
MD5
0b0966b21ee5cf448db5ededfa7146e8
-
SHA1
28772e05bc6008389beca373cab53db75fc36b18
-
SHA256
f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
-
SHA512
d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2324 oobeldr.exe 3868 oobeldr.exe 4672 oobeldr.exe 1288 oobeldr.exe 980 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3520 set thread context of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 2324 set thread context of 3868 2324 oobeldr.exe 70 PID 4672 set thread context of 980 4672 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1484 schtasks.exe 3284 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3520 wrote to memory of 3016 3520 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 66 PID 3016 wrote to memory of 1484 3016 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 67 PID 3016 wrote to memory of 1484 3016 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 67 PID 3016 wrote to memory of 1484 3016 f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe 67 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 2324 wrote to memory of 3868 2324 oobeldr.exe 70 PID 3868 wrote to memory of 3284 3868 oobeldr.exe 71 PID 3868 wrote to memory of 3284 3868 oobeldr.exe 71 PID 3868 wrote to memory of 3284 3868 oobeldr.exe 71 PID 4672 wrote to memory of 1288 4672 oobeldr.exe 74 PID 4672 wrote to memory of 1288 4672 oobeldr.exe 74 PID 4672 wrote to memory of 1288 4672 oobeldr.exe 74 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75 PID 4672 wrote to memory of 980 4672 oobeldr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe"C:\Users\Admin\AppData\Local\Temp\f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exeC:\Users\Admin\AppData\Local\Temp\f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:1484
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3284
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1288
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d
-
Filesize
324KB
MD50b0966b21ee5cf448db5ededfa7146e8
SHA128772e05bc6008389beca373cab53db75fc36b18
SHA256f6b56ed89608bed732602e8be17c13d1098f10c4e25ab039b56e2268647dfbb9
SHA512d48b0d6176634aa3baab30be952a216cac9a8b27df247a901a737a26b7162d9942a59ce09b0dd41047080358c8beb6029a85e878b0afccd00caf61fea532b58d