Analysis
-
max time kernel
181s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 09:23
General
-
Target
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe
-
Size
5.2MB
-
MD5
bcbb46256a4af7b5509b2924be449bc3
-
SHA1
1692917c482954c43a5b0127fc1b4c939fe7cbd2
-
SHA256
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
-
SHA512
4c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
SSDEEP
98304:z5E5IoBr0SdozMevlC5J0xTSdR7QISNVVhiiXk04QVKLg+5yG:z099ozMedC56SdR7QISNdk04JLp5yG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 4444 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
oobeldr.exef7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe -
Processes:
resource yara_rule behavioral1/memory/208-132-0x0000000000FD0000-0x0000000001B72000-memory.dmp themida behavioral1/memory/208-135-0x0000000000FD0000-0x0000000001B72000-memory.dmp themida behavioral1/memory/208-136-0x0000000000FD0000-0x0000000001B72000-memory.dmp themida behavioral1/memory/208-138-0x0000000000FD0000-0x0000000001B72000-memory.dmp themida behavioral1/memory/208-140-0x0000000000FD0000-0x0000000001B72000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe themida behavioral1/memory/4444-143-0x0000000000470000-0x0000000001012000-memory.dmp themida behavioral1/memory/4444-146-0x0000000000470000-0x0000000001012000-memory.dmp themida behavioral1/memory/4444-147-0x0000000000470000-0x0000000001012000-memory.dmp themida behavioral1/memory/4444-149-0x0000000000470000-0x0000000001012000-memory.dmp themida behavioral1/memory/4444-151-0x0000000000470000-0x0000000001012000-memory.dmp themida -
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exepid process 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 4444 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1268 schtasks.exe 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exepid process 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe 4444 oobeldr.exe 4444 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exeoobeldr.exedescription pid process target process PID 208 wrote to memory of 1268 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 208 wrote to memory of 1268 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 208 wrote to memory of 1268 208 f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe schtasks.exe PID 4444 wrote to memory of 2660 4444 oobeldr.exe schtasks.exe PID 4444 wrote to memory of 2660 4444 oobeldr.exe schtasks.exe PID 4444 wrote to memory of 2660 4444 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe"C:\Users\Admin\AppData\Local\Temp\f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
5.2MB
MD5bcbb46256a4af7b5509b2924be449bc3
SHA11692917c482954c43a5b0127fc1b4c939fe7cbd2
SHA256f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
SHA5124c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
memory/208-138-0x0000000000FD0000-0x0000000001B72000-memory.dmpFilesize
11.6MB
-
memory/208-141-0x0000000077730000-0x00000000778D3000-memory.dmpFilesize
1.6MB
-
memory/208-136-0x0000000000FD0000-0x0000000001B72000-memory.dmpFilesize
11.6MB
-
memory/208-132-0x0000000000FD0000-0x0000000001B72000-memory.dmpFilesize
11.6MB
-
memory/208-137-0x0000000000FD1000-0x0000000000FD3000-memory.dmpFilesize
8KB
-
memory/208-140-0x0000000000FD0000-0x0000000001B72000-memory.dmpFilesize
11.6MB
-
memory/208-135-0x0000000000FD0000-0x0000000001B72000-memory.dmpFilesize
11.6MB
-
memory/208-134-0x0000000000FD1000-0x0000000000FD3000-memory.dmpFilesize
8KB
-
memory/208-133-0x0000000077730000-0x00000000778D3000-memory.dmpFilesize
1.6MB
-
memory/1268-139-0x0000000000000000-mapping.dmp
-
memory/2660-150-0x0000000000000000-mapping.dmp
-
memory/4444-152-0x0000000077730000-0x00000000778D3000-memory.dmpFilesize
1.6MB
-
memory/4444-146-0x0000000000470000-0x0000000001012000-memory.dmpFilesize
11.6MB
-
memory/4444-147-0x0000000000470000-0x0000000001012000-memory.dmpFilesize
11.6MB
-
memory/4444-148-0x0000000000471000-0x0000000000473000-memory.dmpFilesize
8KB
-
memory/4444-149-0x0000000000470000-0x0000000001012000-memory.dmpFilesize
11.6MB
-
memory/4444-143-0x0000000000470000-0x0000000001012000-memory.dmpFilesize
11.6MB
-
memory/4444-151-0x0000000000470000-0x0000000001012000-memory.dmpFilesize
11.6MB
-
memory/4444-144-0x0000000077730000-0x00000000778D3000-memory.dmpFilesize
1.6MB