Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe
Resource
win10-20220812-en
General
-
Target
53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe
-
Size
327KB
-
MD5
549e17e83592cf24257229a826e6e28c
-
SHA1
36701bd0e35c789bbc184f7562610ba3db1e1842
-
SHA256
53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
-
SHA512
23d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3548 oobeldr.exe 2732 oobeldr.exe 3124 oobeldr.exe 4344 oobeldr.exe 4348 oobeldr.exe 4648 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4696 set thread context of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 3548 set thread context of 2732 3548 oobeldr.exe 70 PID 3124 set thread context of 4648 3124 oobeldr.exe 76 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4212 schtasks.exe 3208 schtasks.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4696 wrote to memory of 4832 4696 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 66 PID 4832 wrote to memory of 4212 4832 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 67 PID 4832 wrote to memory of 4212 4832 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 67 PID 4832 wrote to memory of 4212 4832 53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe 67 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 3548 wrote to memory of 2732 3548 oobeldr.exe 70 PID 2732 wrote to memory of 3208 2732 oobeldr.exe 71 PID 2732 wrote to memory of 3208 2732 oobeldr.exe 71 PID 2732 wrote to memory of 3208 2732 oobeldr.exe 71 PID 3124 wrote to memory of 4344 3124 oobeldr.exe 74 PID 3124 wrote to memory of 4344 3124 oobeldr.exe 74 PID 3124 wrote to memory of 4344 3124 oobeldr.exe 74 PID 3124 wrote to memory of 4348 3124 oobeldr.exe 75 PID 3124 wrote to memory of 4348 3124 oobeldr.exe 75 PID 3124 wrote to memory of 4348 3124 oobeldr.exe 75 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76 PID 3124 wrote to memory of 4648 3124 oobeldr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe"C:\Users\Admin\AppData\Local\Temp\53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exeC:\Users\Admin\AppData\Local\Temp\53a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4212
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3208
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4344
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4348
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4648
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5
-
Filesize
327KB
MD5549e17e83592cf24257229a826e6e28c
SHA136701bd0e35c789bbc184f7562610ba3db1e1842
SHA25653a0e17b092c400d25c70497d0402917bfdd06d4308f7ed34ba8beac586db140
SHA51223d85ba0134cd2088a8e49af77e84f3fd9ff2168519124c4ad1e9bdc8cef23932226c73d3be2d98896cda8acc0f3e26931fd17876d985a39ad514593812744e5