Analysis
-
max time kernel
102s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
Resource
win10-20220901-en
General
-
Target
cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
-
Size
326KB
-
MD5
08ee4c63b3c8f2048af238dfa9c25fc3
-
SHA1
2341c232f777451ee1785ce6a78719a0b5e132ea
-
SHA256
cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
-
SHA512
8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4720 oobeldr.exe 3704 oobeldr.exe 4316 oobeldr.exe 3676 oobeldr.exe 1684 oobeldr.exe 1184 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 328 set thread context of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 4720 set thread context of 3676 4720 oobeldr.exe 73 PID 1684 set thread context of 1184 1684 oobeldr.exe 77 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe 4912 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 328 wrote to memory of 3468 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 66 PID 328 wrote to memory of 3468 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 66 PID 328 wrote to memory of 3468 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 66 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 328 wrote to memory of 3488 328 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 67 PID 3488 wrote to memory of 3604 3488 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 68 PID 3488 wrote to memory of 3604 3488 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 68 PID 3488 wrote to memory of 3604 3488 cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe 68 PID 4720 wrote to memory of 3704 4720 oobeldr.exe 71 PID 4720 wrote to memory of 3704 4720 oobeldr.exe 71 PID 4720 wrote to memory of 3704 4720 oobeldr.exe 71 PID 4720 wrote to memory of 4316 4720 oobeldr.exe 72 PID 4720 wrote to memory of 4316 4720 oobeldr.exe 72 PID 4720 wrote to memory of 4316 4720 oobeldr.exe 72 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 4720 wrote to memory of 3676 4720 oobeldr.exe 73 PID 3676 wrote to memory of 4912 3676 oobeldr.exe 74 PID 3676 wrote to memory of 4912 3676 oobeldr.exe 74 PID 3676 wrote to memory of 4912 3676 oobeldr.exe 74 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77 PID 1684 wrote to memory of 1184 1684 oobeldr.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe"C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exeC:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe2⤵PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exeC:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3604
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:3704
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4316
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4912
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166
-
Filesize
326KB
MD508ee4c63b3c8f2048af238dfa9c25fc3
SHA12341c232f777451ee1785ce6a78719a0b5e132ea
SHA256cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6
SHA5128ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166