Analysis
-
max time kernel
128s -
max time network
260s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
15/07/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe
Resource
win10-20230703-en
General
-
Target
93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe
-
Size
321KB
-
MD5
685c427f4139526bdfe98ee53f040dbd
-
SHA1
f07c84a1a0921de713ee6c7406c335d8ac6a4a80
-
SHA256
93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041
-
SHA512
fbf201f5be14c38a8467f4304ce21e7e1472303cd089f078343570e7544a7ee16c4fc2b8e635e385a5344c6cb99d9fcb2e4b8cbcb02578da0a97307f33c80e50
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 828 oobeldr.exe 4640 oobeldr.exe 3644 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3244 set thread context of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 828 set thread context of 3644 828 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4716 schtasks.exe 4968 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3244 wrote to memory of 3148 3244 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 70 PID 3148 wrote to memory of 4716 3148 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 71 PID 3148 wrote to memory of 4716 3148 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 71 PID 3148 wrote to memory of 4716 3148 93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe 71 PID 828 wrote to memory of 4640 828 oobeldr.exe 74 PID 828 wrote to memory of 4640 828 oobeldr.exe 74 PID 828 wrote to memory of 4640 828 oobeldr.exe 74 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 828 wrote to memory of 3644 828 oobeldr.exe 75 PID 3644 wrote to memory of 4968 3644 oobeldr.exe 76 PID 3644 wrote to memory of 4968 3644 oobeldr.exe 76 PID 3644 wrote to memory of 4968 3644 oobeldr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe"C:\Users\Admin\AppData\Local\Temp\93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exeC:\Users\Admin\AppData\Local\Temp\93432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4716
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4640
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD5685c427f4139526bdfe98ee53f040dbd
SHA1f07c84a1a0921de713ee6c7406c335d8ac6a4a80
SHA25693432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041
SHA512fbf201f5be14c38a8467f4304ce21e7e1472303cd089f078343570e7544a7ee16c4fc2b8e635e385a5344c6cb99d9fcb2e4b8cbcb02578da0a97307f33c80e50
-
Filesize
321KB
MD5685c427f4139526bdfe98ee53f040dbd
SHA1f07c84a1a0921de713ee6c7406c335d8ac6a4a80
SHA25693432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041
SHA512fbf201f5be14c38a8467f4304ce21e7e1472303cd089f078343570e7544a7ee16c4fc2b8e635e385a5344c6cb99d9fcb2e4b8cbcb02578da0a97307f33c80e50
-
Filesize
321KB
MD5685c427f4139526bdfe98ee53f040dbd
SHA1f07c84a1a0921de713ee6c7406c335d8ac6a4a80
SHA25693432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041
SHA512fbf201f5be14c38a8467f4304ce21e7e1472303cd089f078343570e7544a7ee16c4fc2b8e635e385a5344c6cb99d9fcb2e4b8cbcb02578da0a97307f33c80e50
-
Filesize
321KB
MD5685c427f4139526bdfe98ee53f040dbd
SHA1f07c84a1a0921de713ee6c7406c335d8ac6a4a80
SHA25693432b4a398d9396c603128827e1091b3411d29f206e993dd055012e892ca041
SHA512fbf201f5be14c38a8467f4304ce21e7e1472303cd089f078343570e7544a7ee16c4fc2b8e635e385a5344c6cb99d9fcb2e4b8cbcb02578da0a97307f33c80e50