Analysis
-
max time kernel
100s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/02/2023, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe
Resource
win10-20220812-en
General
-
Target
109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe
-
Size
329KB
-
MD5
9439f81ec631b4af02a462eaed7432a9
-
SHA1
de0560a37048f70381b50521a677e3e7a25b645a
-
SHA256
109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
-
SHA512
78bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4180 oobeldr.exe 4424 oobeldr.exe 3956 oobeldr.exe 752 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1968 set thread context of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 4180 set thread context of 4424 4180 oobeldr.exe 70 PID 3956 set thread context of 752 3956 oobeldr.exe 74 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1280 schtasks.exe 3276 schtasks.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 1968 wrote to memory of 4600 1968 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 66 PID 4600 wrote to memory of 1280 4600 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 67 PID 4600 wrote to memory of 1280 4600 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 67 PID 4600 wrote to memory of 1280 4600 109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe 67 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4180 wrote to memory of 4424 4180 oobeldr.exe 70 PID 4424 wrote to memory of 3276 4424 oobeldr.exe 71 PID 4424 wrote to memory of 3276 4424 oobeldr.exe 71 PID 4424 wrote to memory of 3276 4424 oobeldr.exe 71 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74 PID 3956 wrote to memory of 752 3956 oobeldr.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe"C:\Users\Admin\AppData\Local\Temp\109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exeC:\Users\Admin\AppData\Local\Temp\109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:1280
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3276
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
329KB
MD59439f81ec631b4af02a462eaed7432a9
SHA1de0560a37048f70381b50521a677e3e7a25b645a
SHA256109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
SHA51278bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b
-
Filesize
329KB
MD59439f81ec631b4af02a462eaed7432a9
SHA1de0560a37048f70381b50521a677e3e7a25b645a
SHA256109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
SHA51278bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b
-
Filesize
329KB
MD59439f81ec631b4af02a462eaed7432a9
SHA1de0560a37048f70381b50521a677e3e7a25b645a
SHA256109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
SHA51278bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b
-
Filesize
329KB
MD59439f81ec631b4af02a462eaed7432a9
SHA1de0560a37048f70381b50521a677e3e7a25b645a
SHA256109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
SHA51278bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b
-
Filesize
329KB
MD59439f81ec631b4af02a462eaed7432a9
SHA1de0560a37048f70381b50521a677e3e7a25b645a
SHA256109b3a961b9f0adb93377c4fe45653a55d022eca29e97e75c60eb211bfd0971b
SHA51278bdd53dd0b22ddb7c64ac316678c4890b3c1a9e366fa0aeeb59c20eef5b2f8fac8dd9d8e3fc8d0ecfa737835e031cf6bf2e7f5edd33fdf0cde1b90cbbb6749b