Analysis

  • max time kernel
    102s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/11/2022, 07:41

General

  • Target

    cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe

  • Size

    326KB

  • MD5

    08ee4c63b3c8f2048af238dfa9c25fc3

  • SHA1

    2341c232f777451ee1785ce6a78719a0b5e132ea

  • SHA256

    cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

  • SHA512

    8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:328
    • C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
      C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
      2⤵
        PID:3468
      • C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
        C:\Users\Admin\AppData\Local\Temp\cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:3604
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:3704
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:4316
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4912
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:1184

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

            Filesize

            789B

            MD5

            db5ef8d7c51bad129d9097bf953e4913

            SHA1

            8439db960aa2d431bf5ec3c37af775b45eb07e06

            SHA256

            1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

            SHA512

            04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

            Filesize

            326KB

            MD5

            08ee4c63b3c8f2048af238dfa9c25fc3

            SHA1

            2341c232f777451ee1785ce6a78719a0b5e132ea

            SHA256

            cbcc1f8084d3f4c9b7be4a0abb6ae535101590b43a3b9d35f14ee85fa8809ea6

            SHA512

            8ba3155380d116687ec329d947b072ffa10f7bf71a78b43b32824f896aa2a11b49535539a813b8a8d1cee09f62b1b22f620028c0a3cc5fbdf77ffbfca6c73166

          • memory/328-158-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-172-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-127-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-128-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-129-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-130-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-131-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-132-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-133-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-134-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-135-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-136-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-161-0x0000000007600000-0x00000000076CC000-memory.dmp

            Filesize

            816KB

          • memory/328-139-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-138-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-140-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-141-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-142-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-143-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-144-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-145-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-146-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-147-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-148-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-149-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-150-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-151-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-152-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-153-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-154-0x00000000008C0000-0x0000000000916000-memory.dmp

            Filesize

            344KB

          • memory/328-155-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-156-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-157-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-159-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-125-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-160-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-137-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-126-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-177-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-164-0x0000000007770000-0x0000000007802000-memory.dmp

            Filesize

            584KB

          • memory/328-165-0x0000000005220000-0x0000000005226000-memory.dmp

            Filesize

            24KB

          • memory/328-166-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-167-0x0000000007A10000-0x0000000007A86000-memory.dmp

            Filesize

            472KB

          • memory/328-168-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-169-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-170-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-171-0x00000000076D0000-0x00000000076EE000-memory.dmp

            Filesize

            120KB

          • memory/328-162-0x0000000007BD0000-0x00000000080CE000-memory.dmp

            Filesize

            5.0MB

          • memory/328-173-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-174-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-175-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-176-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-163-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-184-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-120-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-121-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-122-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-123-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/328-124-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-232-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/3488-188-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-189-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-182-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-181-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-187-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-183-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-191-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-190-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-178-0x0000000000400000-0x0000000000406000-memory.dmp

            Filesize

            24KB

          • memory/3488-186-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB

          • memory/3488-180-0x0000000077460000-0x00000000775EE000-memory.dmp

            Filesize

            1.6MB