Analysis
-
max time kernel
136s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2022 14:50
Behavioral task
behavioral1
Sample
bcbb46256a4af7b5509b2924be449bc3.exe
Resource
win7-20220901-en
General
-
Target
bcbb46256a4af7b5509b2924be449bc3.exe
-
Size
5.2MB
-
MD5
bcbb46256a4af7b5509b2924be449bc3
-
SHA1
1692917c482954c43a5b0127fc1b4c939fe7cbd2
-
SHA256
f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
-
SHA512
4c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
SSDEEP
98304:z5E5IoBr0SdozMevlC5J0xTSdR7QISNVVhiiXk04QVKLg+5yG:z099ozMedC56SdR7QISNdk04JLp5yG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bcbb46256a4af7b5509b2924be449bc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Executes dropped EXE 1 IoCs
Processes:
oobeldr.exepid process 3648 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bcbb46256a4af7b5509b2924be449bc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bcbb46256a4af7b5509b2924be449bc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Processes:
resource yara_rule behavioral2/memory/4192-132-0x00000000005F0000-0x0000000001192000-memory.dmp themida behavioral2/memory/4192-135-0x00000000005F0000-0x0000000001192000-memory.dmp themida behavioral2/memory/4192-136-0x00000000005F0000-0x0000000001192000-memory.dmp themida behavioral2/memory/4192-138-0x00000000005F0000-0x0000000001192000-memory.dmp themida behavioral2/memory/4192-140-0x00000000005F0000-0x0000000001192000-memory.dmp themida C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe themida behavioral2/memory/3648-143-0x0000000000E10000-0x00000000019B2000-memory.dmp themida behavioral2/memory/3648-146-0x0000000000E10000-0x00000000019B2000-memory.dmp themida behavioral2/memory/3648-147-0x0000000000E10000-0x00000000019B2000-memory.dmp themida behavioral2/memory/3648-149-0x0000000000E10000-0x00000000019B2000-memory.dmp themida behavioral2/memory/3648-151-0x0000000000E10000-0x00000000019B2000-memory.dmp themida -
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bcbb46256a4af7b5509b2924be449bc3.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exepid process 4192 bcbb46256a4af7b5509b2924be449bc3.exe 3648 oobeldr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3488 schtasks.exe 1168 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exepid process 4192 bcbb46256a4af7b5509b2924be449bc3.exe 4192 bcbb46256a4af7b5509b2924be449bc3.exe 3648 oobeldr.exe 3648 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
bcbb46256a4af7b5509b2924be449bc3.exeoobeldr.exedescription pid process target process PID 4192 wrote to memory of 3488 4192 bcbb46256a4af7b5509b2924be449bc3.exe schtasks.exe PID 4192 wrote to memory of 3488 4192 bcbb46256a4af7b5509b2924be449bc3.exe schtasks.exe PID 4192 wrote to memory of 3488 4192 bcbb46256a4af7b5509b2924be449bc3.exe schtasks.exe PID 3648 wrote to memory of 1168 3648 oobeldr.exe schtasks.exe PID 3648 wrote to memory of 1168 3648 oobeldr.exe schtasks.exe PID 3648 wrote to memory of 1168 3648 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcbb46256a4af7b5509b2924be449bc3.exe"C:\Users\Admin\AppData\Local\Temp\bcbb46256a4af7b5509b2924be449bc3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
5.2MB
MD5bcbb46256a4af7b5509b2924be449bc3
SHA11692917c482954c43a5b0127fc1b4c939fe7cbd2
SHA256f7bed46fe83995d9a4eff5e9bf41c26e0721bcced7ef05a47284bb59f44b274e
SHA5124c87f101ffeaf0a6692e2adb98e83713a68a5aa8bfe83b5c6ef19b787631eb19b707c4cd8935e8eb0770154dd0e92389c61c657c36fc2d6ba62e903b2bb6b450
-
memory/1168-150-0x0000000000000000-mapping.dmp
-
memory/3488-139-0x0000000000000000-mapping.dmp
-
memory/3648-148-0x0000000000E11000-0x0000000000E13000-memory.dmpFilesize
8KB
-
memory/3648-149-0x0000000000E10000-0x00000000019B2000-memory.dmpFilesize
11.6MB
-
memory/3648-152-0x00000000774A0000-0x0000000077643000-memory.dmpFilesize
1.6MB
-
memory/3648-151-0x0000000000E10000-0x00000000019B2000-memory.dmpFilesize
11.6MB
-
memory/3648-147-0x0000000000E10000-0x00000000019B2000-memory.dmpFilesize
11.6MB
-
memory/3648-146-0x0000000000E10000-0x00000000019B2000-memory.dmpFilesize
11.6MB
-
memory/3648-144-0x00000000774A0000-0x0000000077643000-memory.dmpFilesize
1.6MB
-
memory/3648-143-0x0000000000E10000-0x00000000019B2000-memory.dmpFilesize
11.6MB
-
memory/4192-134-0x00000000005F1000-0x00000000005F3000-memory.dmpFilesize
8KB
-
memory/4192-141-0x00000000774A0000-0x0000000077643000-memory.dmpFilesize
1.6MB
-
memory/4192-140-0x00000000005F0000-0x0000000001192000-memory.dmpFilesize
11.6MB
-
memory/4192-135-0x00000000005F0000-0x0000000001192000-memory.dmpFilesize
11.6MB
-
memory/4192-132-0x00000000005F0000-0x0000000001192000-memory.dmpFilesize
11.6MB
-
memory/4192-136-0x00000000005F0000-0x0000000001192000-memory.dmpFilesize
11.6MB
-
memory/4192-133-0x00000000774A0000-0x0000000077643000-memory.dmpFilesize
1.6MB
-
memory/4192-138-0x00000000005F0000-0x0000000001192000-memory.dmpFilesize
11.6MB
-
memory/4192-137-0x00000000005F1000-0x00000000005F3000-memory.dmpFilesize
8KB