Analysis
-
max time kernel
104s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe
Resource
win10-20220812-en
General
-
Target
6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe
-
Size
326KB
-
MD5
405991e7d725f7fb1e9257b941039cfd
-
SHA1
2308b04f70679a843a3489088c4f39bf9243dfef
-
SHA256
6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
-
SHA512
3bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4612 oobeldr.exe 4192 oobeldr.exe 1232 oobeldr.exe 3048 oobeldr.exe 4892 oobeldr.exe 420 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2648 set thread context of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 4612 set thread context of 3048 4612 oobeldr.exe 72 PID 4892 set thread context of 420 4892 oobeldr.exe 76 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 4848 schtasks.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 2648 wrote to memory of 5036 2648 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 66 PID 5036 wrote to memory of 2728 5036 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 67 PID 5036 wrote to memory of 2728 5036 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 67 PID 5036 wrote to memory of 2728 5036 6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe 67 PID 4612 wrote to memory of 4192 4612 oobeldr.exe 70 PID 4612 wrote to memory of 4192 4612 oobeldr.exe 70 PID 4612 wrote to memory of 4192 4612 oobeldr.exe 70 PID 4612 wrote to memory of 1232 4612 oobeldr.exe 71 PID 4612 wrote to memory of 1232 4612 oobeldr.exe 71 PID 4612 wrote to memory of 1232 4612 oobeldr.exe 71 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 4612 wrote to memory of 3048 4612 oobeldr.exe 72 PID 3048 wrote to memory of 4848 3048 oobeldr.exe 73 PID 3048 wrote to memory of 4848 3048 oobeldr.exe 73 PID 3048 wrote to memory of 4848 3048 oobeldr.exe 73 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76 PID 4892 wrote to memory of 420 4892 oobeldr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe"C:\Users\Admin\AppData\Local\Temp\6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exeC:\Users\Admin\AppData\Local\Temp\6c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2728
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4192
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1232
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4848
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:420
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57
-
Filesize
326KB
MD5405991e7d725f7fb1e9257b941039cfd
SHA12308b04f70679a843a3489088c4f39bf9243dfef
SHA2566c7cd6f490ba65cf184bd87369957cdb178e6e48f7331f99dbffd817bb2623c2
SHA5123bbebcf29aba89548a05fdddcd33311ed07b929c0b7ec8f575f0f7ad0f4ad533f3a37bf4741e84a1946c3192eb7fb4c873ca5c8da9a2411f0c92e9c85e1d8a57