Analysis
-
max time kernel
283s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
07-08-2023 04:49
Static task
static1
Behavioral task
behavioral1
Sample
f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe
Resource
win10-20230703-en
General
-
Target
f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe
-
Size
321KB
-
MD5
752e135e9db4e0970ecce646378c28f2
-
SHA1
656ed5c240650b320ff8f65e2d264a21d5cc50ff
-
SHA256
f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
-
SHA512
cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2788 oobeldr.exe 1384 oobeldr.exe 432 oobeldr.exe 1280 oobeldr.exe 3024 oobeldr.exe 1220 oobeldr.exe 1824 oobeldr.exe 2368 oobeldr.exe 2092 oobeldr.exe 1072 oobeldr.exe 2480 oobeldr.exe 1344 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1260 set thread context of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 2788 set thread context of 432 2788 oobeldr.exe 40 PID 1280 set thread context of 3024 1280 oobeldr.exe 44 PID 1220 set thread context of 1824 1220 oobeldr.exe 46 PID 2368 set thread context of 1072 2368 oobeldr.exe 49 PID 2480 set thread context of 1344 2480 oobeldr.exe 51 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1476 schtasks.exe 2136 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2380 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 28 PID 1260 wrote to memory of 2380 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 28 PID 1260 wrote to memory of 2380 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 28 PID 1260 wrote to memory of 2380 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 28 PID 1260 wrote to memory of 2812 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 29 PID 1260 wrote to memory of 2812 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 29 PID 1260 wrote to memory of 2812 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 29 PID 1260 wrote to memory of 2812 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 29 PID 1260 wrote to memory of 2816 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 30 PID 1260 wrote to memory of 2816 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 30 PID 1260 wrote to memory of 2816 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 30 PID 1260 wrote to memory of 2816 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 30 PID 1260 wrote to memory of 2896 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 31 PID 1260 wrote to memory of 2896 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 31 PID 1260 wrote to memory of 2896 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 31 PID 1260 wrote to memory of 2896 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 31 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 1260 wrote to memory of 2920 1260 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 32 PID 2920 wrote to memory of 2136 2920 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 34 PID 2920 wrote to memory of 2136 2920 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 34 PID 2920 wrote to memory of 2136 2920 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 34 PID 2920 wrote to memory of 2136 2920 f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe 34 PID 2684 wrote to memory of 2788 2684 taskeng.exe 38 PID 2684 wrote to memory of 2788 2684 taskeng.exe 38 PID 2684 wrote to memory of 2788 2684 taskeng.exe 38 PID 2684 wrote to memory of 2788 2684 taskeng.exe 38 PID 2788 wrote to memory of 1384 2788 oobeldr.exe 39 PID 2788 wrote to memory of 1384 2788 oobeldr.exe 39 PID 2788 wrote to memory of 1384 2788 oobeldr.exe 39 PID 2788 wrote to memory of 1384 2788 oobeldr.exe 39 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 2788 wrote to memory of 432 2788 oobeldr.exe 40 PID 432 wrote to memory of 1476 432 oobeldr.exe 41 PID 432 wrote to memory of 1476 432 oobeldr.exe 41 PID 432 wrote to memory of 1476 432 oobeldr.exe 41 PID 432 wrote to memory of 1476 432 oobeldr.exe 41 PID 2684 wrote to memory of 1280 2684 taskeng.exe 43 PID 2684 wrote to memory of 1280 2684 taskeng.exe 43 PID 2684 wrote to memory of 1280 2684 taskeng.exe 43 PID 2684 wrote to memory of 1280 2684 taskeng.exe 43 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 1280 wrote to memory of 3024 1280 oobeldr.exe 44 PID 2684 wrote to memory of 1220 2684 taskeng.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe"C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exeC:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe2⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exeC:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exeC:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exeC:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe2⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exeC:\Users\Admin\AppData\Local\Temp\f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2136
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {25DBC7B8-B0D9-40F3-9DD2-EA3EDB82CC39} S-1-5-21-1024678951-1535676557-2778719785-1000:KDGGTDCU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:1476
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1824
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1072
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2480 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48
-
Filesize
321KB
MD5752e135e9db4e0970ecce646378c28f2
SHA1656ed5c240650b320ff8f65e2d264a21d5cc50ff
SHA256f221b105971cf5fe4500bb1c77d737b412bed88487e07a054b2f09d8678ba19e
SHA512cfa8d98928b69471dc5a37704eed256134f1d83b81171e27b8a055c42a589cbe8c22464fd12423ec24c5b02597cd4e6d3ed16b4820643b70805c0c5c54aefa48