Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe
Resource
win10-20220812-en
General
-
Target
8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe
-
Size
327KB
-
MD5
768d5bcd030d308f6df4675fdc220ac0
-
SHA1
d360adaf5464726ea49a2ddb70c13d4dceebc040
-
SHA256
8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
-
SHA512
81ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 4900 oobeldr.exe 4720 oobeldr.exe 4740 oobeldr.exe 492 oobeldr.exe 1616 oobeldr.exe 1496 oobeldr.exe 1452 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3844 set thread context of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 4900 set thread context of 4740 4900 oobeldr.exe 71 PID 492 set thread context of 1452 492 oobeldr.exe 77 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe 4608 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3844 wrote to memory of 3984 3844 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 66 PID 3984 wrote to memory of 2672 3984 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 67 PID 3984 wrote to memory of 2672 3984 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 67 PID 3984 wrote to memory of 2672 3984 8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe 67 PID 4900 wrote to memory of 4720 4900 oobeldr.exe 70 PID 4900 wrote to memory of 4720 4900 oobeldr.exe 70 PID 4900 wrote to memory of 4720 4900 oobeldr.exe 70 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4900 wrote to memory of 4740 4900 oobeldr.exe 71 PID 4740 wrote to memory of 4608 4740 oobeldr.exe 72 PID 4740 wrote to memory of 4608 4740 oobeldr.exe 72 PID 4740 wrote to memory of 4608 4740 oobeldr.exe 72 PID 492 wrote to memory of 1616 492 oobeldr.exe 75 PID 492 wrote to memory of 1616 492 oobeldr.exe 75 PID 492 wrote to memory of 1616 492 oobeldr.exe 75 PID 492 wrote to memory of 1496 492 oobeldr.exe 76 PID 492 wrote to memory of 1496 492 oobeldr.exe 76 PID 492 wrote to memory of 1496 492 oobeldr.exe 76 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77 PID 492 wrote to memory of 1452 492 oobeldr.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe"C:\Users\Admin\AppData\Local\Temp\8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exeC:\Users\Admin\AppData\Local\Temp\8d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2672
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4720
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4608
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1616
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1452
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c
-
Filesize
327KB
MD5768d5bcd030d308f6df4675fdc220ac0
SHA1d360adaf5464726ea49a2ddb70c13d4dceebc040
SHA2568d5b84e4f76bc820f42a76162656280478211bc8562aff3bb9d59368795eb334
SHA51281ae1940cd72f7f63fd19668dd9195bc4585e5f6290d6f439e0a4fa862e8a0c11b9a631acae6cc54cbbd58b36e8d3b19fab575d340f551c05a3b91c2b1d09e8c