Analysis

  • max time kernel
    110s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-02-2023 10:10

General

  • Target

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5.exe

  • Size

    329KB

  • MD5

    0da416383d6a2f9da2a62a8d633ac356

  • SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

  • SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

  • SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5.exe
    "C:\Users\Admin\AppData\Local\Temp\f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5.exe
      C:\Users\Admin\AppData\Local\Temp\f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2000
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:5060
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4884
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log

    Filesize

    789B

    MD5

    db5ef8d7c51bad129d9097bf953e4913

    SHA1

    8439db960aa2d431bf5ec3c37af775b45eb07e06

    SHA256

    1248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9

    SHA512

    04572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    329KB

    MD5

    0da416383d6a2f9da2a62a8d633ac356

    SHA1

    264b25fe52449a1de9163f334ffcc536140b35e3

    SHA256

    f9e77e4ece9b70a8fb9364ad9f202003d2fd79621c0363626483ed78e4282ff5

    SHA512

    200728c0449869811fa087e500705c8b5a7f0f2b9b2e9999428662c3ac6c02dae2aa5ccacfde98dda725cfab03db4f3a68db6a48df258061b1529ab1a83d592e

  • memory/1408-396-0x0000000000402354-mapping.dmp

  • memory/2000-212-0x0000000000000000-mapping.dmp

  • memory/2704-155-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-119-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-126-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-127-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-128-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-129-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-130-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-131-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-132-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-133-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-134-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-135-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-136-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-137-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-138-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-139-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-140-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-141-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-142-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-143-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-144-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-145-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-146-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-147-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-148-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-149-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-150-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-151-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-152-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-153-0x0000000000510000-0x0000000000566000-memory.dmp

    Filesize

    344KB

  • memory/2704-154-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-124-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-156-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-157-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-158-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-159-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-161-0x0000000007820000-0x0000000007D1E000-memory.dmp

    Filesize

    5.0MB

  • memory/2704-125-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-160-0x0000000007250000-0x000000000731C000-memory.dmp

    Filesize

    816KB

  • memory/2704-163-0x00000000073C0000-0x0000000007452000-memory.dmp

    Filesize

    584KB

  • memory/2704-164-0x0000000004E70000-0x0000000004E76000-memory.dmp

    Filesize

    24KB

  • memory/2704-165-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-166-0x0000000007660000-0x00000000076D6000-memory.dmp

    Filesize

    472KB

  • memory/2704-167-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-168-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-169-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-170-0x0000000007320000-0x000000000733E000-memory.dmp

    Filesize

    120KB

  • memory/2704-171-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-172-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-173-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-174-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-175-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-176-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-183-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-162-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-120-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-121-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-122-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2704-123-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/4884-323-0x0000000000000000-mapping.dmp

  • memory/5044-289-0x0000000000402354-mapping.dmp

  • memory/5100-180-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-186-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-188-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-182-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-185-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-187-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-181-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-179-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-178-0x0000000000402354-mapping.dmp

  • memory/5100-177-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/5100-189-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-190-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/5100-231-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB