Analysis
-
max time kernel
98s -
max time network
140s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 09:45
Static task
static1
Behavioral task
behavioral1
Sample
fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe
Resource
win10-20220901-en
General
-
Target
fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe
-
Size
327KB
-
MD5
1b53b68970fc55f83f2ea5f2e8ce9e6b
-
SHA1
2bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
-
SHA256
fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
-
SHA512
20f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3844 oobeldr.exe 1340 oobeldr.exe 4804 oobeldr.exe 848 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 388 set thread context of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 3844 set thread context of 1340 3844 oobeldr.exe 70 PID 4804 set thread context of 848 4804 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3812 schtasks.exe 4740 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 388 wrote to memory of 2192 388 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 66 PID 2192 wrote to memory of 3812 2192 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 67 PID 2192 wrote to memory of 3812 2192 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 67 PID 2192 wrote to memory of 3812 2192 fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe 67 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 3844 wrote to memory of 1340 3844 oobeldr.exe 70 PID 1340 wrote to memory of 4740 1340 oobeldr.exe 71 PID 1340 wrote to memory of 4740 1340 oobeldr.exe 71 PID 1340 wrote to memory of 4740 1340 oobeldr.exe 71 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74 PID 4804 wrote to memory of 848 4804 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe"C:\Users\Admin\AppData\Local\Temp\fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exeC:\Users\Admin\AppData\Local\Temp\fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3812
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4740
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
327KB
MD51b53b68970fc55f83f2ea5f2e8ce9e6b
SHA12bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
SHA256fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
SHA51220f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34
-
Filesize
327KB
MD51b53b68970fc55f83f2ea5f2e8ce9e6b
SHA12bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
SHA256fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
SHA51220f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34
-
Filesize
327KB
MD51b53b68970fc55f83f2ea5f2e8ce9e6b
SHA12bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
SHA256fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
SHA51220f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34
-
Filesize
327KB
MD51b53b68970fc55f83f2ea5f2e8ce9e6b
SHA12bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
SHA256fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
SHA51220f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34
-
Filesize
327KB
MD51b53b68970fc55f83f2ea5f2e8ce9e6b
SHA12bd11b7d4bb57ae09ed9b3785a1efb31ab6b43d5
SHA256fef1e32bff2956300ff3f9f2b39a75231e33d7e9dcd4de54a6fad807da5a7ddb
SHA51220f8f63f53cf4892a906b615d0ecfdfdc305f579c44e71babdbce7269fc45182a2460394ba216807dd11f3aaf05281c2b3835901159087d76ecfa720a91efd34