Analysis
-
max time kernel
128s -
max time network
260s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
31/08/2023, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe
Resource
win10-20230703-en
General
-
Target
e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe
-
Size
322KB
-
MD5
f83d795de22b48000c597f20c5c7ed16
-
SHA1
034bd1dfccbdc5b0ac2ab18e6a04f49390f429bd
-
SHA256
e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4
-
SHA512
184036c013c121029e4344777bfddf22b73b469cc8875e6502ff8c375db3ee267f8320ba50eea3aedcde636a282c699d06def2a716502afcd8a87453744977d5
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3548 oobeldr.exe 1408 oobeldr.exe 2740 oobeldr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4916 set thread context of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 3548 set thread context of 2740 3548 oobeldr.exe 75 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4464 schtasks.exe 3544 schtasks.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 4916 wrote to memory of 3748 4916 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 70 PID 3748 wrote to memory of 4464 3748 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 71 PID 3748 wrote to memory of 4464 3748 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 71 PID 3748 wrote to memory of 4464 3748 e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe 71 PID 3548 wrote to memory of 1408 3548 oobeldr.exe 74 PID 3548 wrote to memory of 1408 3548 oobeldr.exe 74 PID 3548 wrote to memory of 1408 3548 oobeldr.exe 74 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 3548 wrote to memory of 2740 3548 oobeldr.exe 75 PID 2740 wrote to memory of 3544 2740 oobeldr.exe 76 PID 2740 wrote to memory of 3544 2740 oobeldr.exe 76 PID 2740 wrote to memory of 3544 2740 oobeldr.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe"C:\Users\Admin\AppData\Local\Temp\e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exeC:\Users\Admin\AppData\Local\Temp\e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:4464
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:3544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5f83d795de22b48000c597f20c5c7ed16
SHA1034bd1dfccbdc5b0ac2ab18e6a04f49390f429bd
SHA256e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4
SHA512184036c013c121029e4344777bfddf22b73b469cc8875e6502ff8c375db3ee267f8320ba50eea3aedcde636a282c699d06def2a716502afcd8a87453744977d5
-
Filesize
322KB
MD5f83d795de22b48000c597f20c5c7ed16
SHA1034bd1dfccbdc5b0ac2ab18e6a04f49390f429bd
SHA256e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4
SHA512184036c013c121029e4344777bfddf22b73b469cc8875e6502ff8c375db3ee267f8320ba50eea3aedcde636a282c699d06def2a716502afcd8a87453744977d5
-
Filesize
322KB
MD5f83d795de22b48000c597f20c5c7ed16
SHA1034bd1dfccbdc5b0ac2ab18e6a04f49390f429bd
SHA256e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4
SHA512184036c013c121029e4344777bfddf22b73b469cc8875e6502ff8c375db3ee267f8320ba50eea3aedcde636a282c699d06def2a716502afcd8a87453744977d5
-
Filesize
322KB
MD5f83d795de22b48000c597f20c5c7ed16
SHA1034bd1dfccbdc5b0ac2ab18e6a04f49390f429bd
SHA256e755d9cc24a0eeb7e08761aa2715fd49a346937e6675a2f600815065a3a0b1f4
SHA512184036c013c121029e4344777bfddf22b73b469cc8875e6502ff8c375db3ee267f8320ba50eea3aedcde636a282c699d06def2a716502afcd8a87453744977d5