Analysis
-
max time kernel
273s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
03/09/2023, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe
Resource
win10-20230831-en
General
-
Target
79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe
-
Size
322KB
-
MD5
353abe33062bb6bb408def916254e023
-
SHA1
8d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
-
SHA256
79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
-
SHA512
5096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2520 oobeldr.exe 2536 oobeldr.exe 2836 oobeldr.exe 1872 oobeldr.exe 2348 oobeldr.exe 2808 oobeldr.exe 800 oobeldr.exe 1324 oobeldr.exe 1464 oobeldr.exe 2460 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2056 set thread context of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2520 set thread context of 2536 2520 oobeldr.exe 33 PID 2836 set thread context of 1872 2836 oobeldr.exe 39 PID 2348 set thread context of 2808 2348 oobeldr.exe 41 PID 800 set thread context of 1324 800 oobeldr.exe 43 PID 1464 set thread context of 2460 1464 oobeldr.exe 45 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe 2532 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2056 wrote to memory of 2600 2056 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 28 PID 2600 wrote to memory of 2624 2600 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 29 PID 2600 wrote to memory of 2624 2600 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 29 PID 2600 wrote to memory of 2624 2600 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 29 PID 2600 wrote to memory of 2624 2600 79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe 29 PID 2724 wrote to memory of 2520 2724 taskeng.exe 32 PID 2724 wrote to memory of 2520 2724 taskeng.exe 32 PID 2724 wrote to memory of 2520 2724 taskeng.exe 32 PID 2724 wrote to memory of 2520 2724 taskeng.exe 32 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2520 wrote to memory of 2536 2520 oobeldr.exe 33 PID 2536 wrote to memory of 2532 2536 oobeldr.exe 34 PID 2536 wrote to memory of 2532 2536 oobeldr.exe 34 PID 2536 wrote to memory of 2532 2536 oobeldr.exe 34 PID 2536 wrote to memory of 2532 2536 oobeldr.exe 34 PID 2724 wrote to memory of 2836 2724 taskeng.exe 38 PID 2724 wrote to memory of 2836 2724 taskeng.exe 38 PID 2724 wrote to memory of 2836 2724 taskeng.exe 38 PID 2724 wrote to memory of 2836 2724 taskeng.exe 38 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2836 wrote to memory of 1872 2836 oobeldr.exe 39 PID 2724 wrote to memory of 2348 2724 taskeng.exe 40 PID 2724 wrote to memory of 2348 2724 taskeng.exe 40 PID 2724 wrote to memory of 2348 2724 taskeng.exe 40 PID 2724 wrote to memory of 2348 2724 taskeng.exe 40 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2348 wrote to memory of 2808 2348 oobeldr.exe 41 PID 2724 wrote to memory of 800 2724 taskeng.exe 42 PID 2724 wrote to memory of 800 2724 taskeng.exe 42 PID 2724 wrote to memory of 800 2724 taskeng.exe 42 PID 2724 wrote to memory of 800 2724 taskeng.exe 42 PID 800 wrote to memory of 1324 800 oobeldr.exe 43 PID 800 wrote to memory of 1324 800 oobeldr.exe 43 PID 800 wrote to memory of 1324 800 oobeldr.exe 43 PID 800 wrote to memory of 1324 800 oobeldr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe"C:\Users\Admin\AppData\Local\Temp\79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exeC:\Users\Admin\AppData\Local\Temp\79913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2624
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4C8035AC-2ECE-4AA6-8770-17230FE1E02D} S-1-5-21-2180306848-1874213455-4093218721-1000:XEBBURHY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:2532
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1872
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2808
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1324
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1464 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37
-
Filesize
322KB
MD5353abe33062bb6bb408def916254e023
SHA18d4f8792aff58fe446d5cd78fc8d5b36f0cd677e
SHA25679913df1161a6e3c7dd5d6f4e38c3baa1acd2c60572725220bc5d0934cdaa4ed
SHA5125096d0c5d833c165c8a19995cf7973b3b7b42dd06839cff4a993858f553d557ba9a222fd7f18551b6cc7e13828830d5275a0d7a784edcd54e7bc94ba47d9bc37