Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 09:17
Static task
static1
Behavioral task
behavioral1
Sample
32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe
Resource
win10v2004-20221111-en
General
-
Target
32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe
-
Size
329KB
-
MD5
cab8d3eeab7441e95dc7e219c5840fe8
-
SHA1
a2324e91510d94b42d6b019099a7ac63a098763a
-
SHA256
32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
-
SHA512
8ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4704 oobeldr.exe 228 oobeldr.exe 3892 oobeldr.exe 4776 oobeldr.exe 2104 oobeldr.exe 4524 oobeldr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4960 set thread context of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4704 set thread context of 3892 4704 oobeldr.exe 87 PID 4776 set thread context of 2104 4776 oobeldr.exe 97 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3260 schtasks.exe 3444 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 4960 wrote to memory of 1896 4960 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 81 PID 1896 wrote to memory of 3444 1896 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 82 PID 1896 wrote to memory of 3444 1896 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 82 PID 1896 wrote to memory of 3444 1896 32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe 82 PID 4704 wrote to memory of 228 4704 oobeldr.exe 86 PID 4704 wrote to memory of 228 4704 oobeldr.exe 86 PID 4704 wrote to memory of 228 4704 oobeldr.exe 86 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 4704 wrote to memory of 3892 4704 oobeldr.exe 87 PID 3892 wrote to memory of 3260 3892 oobeldr.exe 88 PID 3892 wrote to memory of 3260 3892 oobeldr.exe 88 PID 3892 wrote to memory of 3260 3892 oobeldr.exe 88 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97 PID 4776 wrote to memory of 2104 4776 oobeldr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe"C:\Users\Admin\AppData\Local\Temp\32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exeC:\Users\Admin\AppData\Local\Temp\32b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3444
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:228
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3260
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
PID:4524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD503d2df1e8834bc4ec1756735429b458c
SHA14ee6c0f5b04c8e0c5076219c5724032daab11d40
SHA256745ab70552d9a0463b791fd8dc1942838ac3e34fb1a68f09ed3766c7e3b05631
SHA5122482c3d4478125ccbc7f224f50e86b7bf925ed438b59f4dce57b9b6bcdb59df51417049096b131b6b911173550eed98bc92aba7050861de303a692f0681b197b
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a
-
Filesize
329KB
MD5cab8d3eeab7441e95dc7e219c5840fe8
SHA1a2324e91510d94b42d6b019099a7ac63a098763a
SHA25632b5414915a336891ee9295c18f5294955679049b50c7352076d0f5be4777f73
SHA5128ef359ef72c64f163347138df4e7b85cc01d6c83b7c6fe93e0a7f5d2158b631324757868ab6eb381a9701c15d13e8e3647e9ec673ed188d7a0b7d11c30bfec4a