Analysis
-
max time kernel
94s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe
Resource
win10-20220812-en
General
-
Target
43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe
-
Size
326KB
-
MD5
7ee2da3def05cd763cf9e4be4f90a858
-
SHA1
ad571b131466575e1df0a544e3584cd8273a7eb1
-
SHA256
43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
-
SHA512
437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4128 oobeldr.exe 4068 oobeldr.exe 4780 oobeldr.exe 3160 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2452 set thread context of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 4128 set thread context of 4068 4128 oobeldr.exe 70 PID 4780 set thread context of 3160 4780 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 schtasks.exe 1780 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 2452 wrote to memory of 4688 2452 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 66 PID 4688 wrote to memory of 1076 4688 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 67 PID 4688 wrote to memory of 1076 4688 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 67 PID 4688 wrote to memory of 1076 4688 43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe 67 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4128 wrote to memory of 4068 4128 oobeldr.exe 70 PID 4068 wrote to memory of 1780 4068 oobeldr.exe 72 PID 4068 wrote to memory of 1780 4068 oobeldr.exe 72 PID 4068 wrote to memory of 1780 4068 oobeldr.exe 72 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74 PID 4780 wrote to memory of 3160 4780 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe"C:\Users\Admin\AppData\Local\Temp\43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exeC:\Users\Admin\AppData\Local\Temp\43986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:1076
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:1780
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:3160
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
326KB
MD57ee2da3def05cd763cf9e4be4f90a858
SHA1ad571b131466575e1df0a544e3584cd8273a7eb1
SHA25643986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
SHA512437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1
-
Filesize
326KB
MD57ee2da3def05cd763cf9e4be4f90a858
SHA1ad571b131466575e1df0a544e3584cd8273a7eb1
SHA25643986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
SHA512437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1
-
Filesize
326KB
MD57ee2da3def05cd763cf9e4be4f90a858
SHA1ad571b131466575e1df0a544e3584cd8273a7eb1
SHA25643986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
SHA512437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1
-
Filesize
326KB
MD57ee2da3def05cd763cf9e4be4f90a858
SHA1ad571b131466575e1df0a544e3584cd8273a7eb1
SHA25643986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
SHA512437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1
-
Filesize
326KB
MD57ee2da3def05cd763cf9e4be4f90a858
SHA1ad571b131466575e1df0a544e3584cd8273a7eb1
SHA25643986763840bcf5357ec606813b9dbdd62a159b77f06a60750fcb020ced34a82
SHA512437ea680888ccc37b44ce9081faa3eafbe7559903a7f31364a99830df84748ec55e743d5e379b8093d3ce087ed6980bdd858ae3909adaea6844fab12f8ca8bf1