Analysis
-
max time kernel
128s -
max time network
61s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02-11-2022 03:35
Static task
static1
Behavioral task
behavioral1
Sample
9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe
Resource
win10-20220812-en
General
-
Target
9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe
-
Size
326KB
-
MD5
8cfa49d3d7ac2cf3a9768933a7579fca
-
SHA1
7bec1d5cd4607bfbc687c39f03e0cca0cd25b735
-
SHA256
9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
-
SHA512
e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4308 oobeldr.exe 4704 oobeldr.exe 3864 oobeldr.exe 784 oobeldr.exe 1724 oobeldr.exe 1816 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4200 set thread context of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4308 set thread context of 4704 4308 oobeldr.exe 71 PID 3864 set thread context of 1816 3864 oobeldr.exe 77 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4176 schtasks.exe 3824 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4200 wrote to memory of 4024 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 66 PID 4200 wrote to memory of 4024 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 66 PID 4200 wrote to memory of 4024 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 66 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4200 wrote to memory of 4800 4200 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 67 PID 4800 wrote to memory of 3824 4800 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 68 PID 4800 wrote to memory of 3824 4800 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 68 PID 4800 wrote to memory of 3824 4800 9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe 68 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4308 wrote to memory of 4704 4308 oobeldr.exe 71 PID 4704 wrote to memory of 4176 4704 oobeldr.exe 72 PID 4704 wrote to memory of 4176 4704 oobeldr.exe 72 PID 4704 wrote to memory of 4176 4704 oobeldr.exe 72 PID 3864 wrote to memory of 784 3864 oobeldr.exe 75 PID 3864 wrote to memory of 784 3864 oobeldr.exe 75 PID 3864 wrote to memory of 784 3864 oobeldr.exe 75 PID 3864 wrote to memory of 1724 3864 oobeldr.exe 76 PID 3864 wrote to memory of 1724 3864 oobeldr.exe 76 PID 3864 wrote to memory of 1724 3864 oobeldr.exe 76 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77 PID 3864 wrote to memory of 1816 3864 oobeldr.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe"C:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exeC:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe2⤵PID:4024
-
-
C:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exeC:\Users\Admin\AppData\Local\Temp\9eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3824
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4176
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:784
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1816
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457
-
Filesize
326KB
MD58cfa49d3d7ac2cf3a9768933a7579fca
SHA17bec1d5cd4607bfbc687c39f03e0cca0cd25b735
SHA2569eaf5d18b080e2dd1227c0bf4ef8d1d075188aa86cec06d7e803f32760e05369
SHA512e3d47f8de1859b9ba9bc70a0d37c0d30236ce825b0b3a3197cff511a40dee285a7ae2bf7798a7fadb836259b3313c3e94b16ec8edbd22de70e70a30acb0bb457