Analysis
-
max time kernel
288s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14-11-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
Resource
win10-20231025-en
General
-
Target
1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
-
Size
323KB
-
MD5
bbb53b948b10672b93e596bcaa4f9c28
-
SHA1
7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
-
SHA256
1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
-
SHA512
d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 2552 oobeldr.exe 2244 oobeldr.exe 3000 oobeldr.exe 524 oobeldr.exe 1976 oobeldr.exe 1920 oobeldr.exe 1176 oobeldr.exe 2476 oobeldr.exe 1532 oobeldr.exe 1896 oobeldr.exe 2176 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2220 set thread context of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2552 set thread context of 3000 2552 oobeldr.exe 36 PID 524 set thread context of 1976 524 oobeldr.exe 40 PID 1920 set thread context of 1176 1920 oobeldr.exe 42 PID 2476 set thread context of 1532 2476 oobeldr.exe 44 PID 1896 set thread context of 2176 1896 oobeldr.exe 46 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2800 schtasks.exe 1628 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2220 wrote to memory of 2736 2220 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 28 PID 2736 wrote to memory of 2800 2736 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 29 PID 2736 wrote to memory of 2800 2736 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 29 PID 2736 wrote to memory of 2800 2736 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 29 PID 2736 wrote to memory of 2800 2736 1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe 29 PID 2772 wrote to memory of 2552 2772 taskeng.exe 34 PID 2772 wrote to memory of 2552 2772 taskeng.exe 34 PID 2772 wrote to memory of 2552 2772 taskeng.exe 34 PID 2772 wrote to memory of 2552 2772 taskeng.exe 34 PID 2552 wrote to memory of 2244 2552 oobeldr.exe 35 PID 2552 wrote to memory of 2244 2552 oobeldr.exe 35 PID 2552 wrote to memory of 2244 2552 oobeldr.exe 35 PID 2552 wrote to memory of 2244 2552 oobeldr.exe 35 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 2552 wrote to memory of 3000 2552 oobeldr.exe 36 PID 3000 wrote to memory of 1628 3000 oobeldr.exe 37 PID 3000 wrote to memory of 1628 3000 oobeldr.exe 37 PID 3000 wrote to memory of 1628 3000 oobeldr.exe 37 PID 3000 wrote to memory of 1628 3000 oobeldr.exe 37 PID 2772 wrote to memory of 524 2772 taskeng.exe 39 PID 2772 wrote to memory of 524 2772 taskeng.exe 39 PID 2772 wrote to memory of 524 2772 taskeng.exe 39 PID 2772 wrote to memory of 524 2772 taskeng.exe 39 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 524 wrote to memory of 1976 524 oobeldr.exe 40 PID 2772 wrote to memory of 1920 2772 taskeng.exe 41 PID 2772 wrote to memory of 1920 2772 taskeng.exe 41 PID 2772 wrote to memory of 1920 2772 taskeng.exe 41 PID 2772 wrote to memory of 1920 2772 taskeng.exe 41 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 1920 wrote to memory of 1176 1920 oobeldr.exe 42 PID 2772 wrote to memory of 2476 2772 taskeng.exe 43 PID 2772 wrote to memory of 2476 2772 taskeng.exe 43 PID 2772 wrote to memory of 2476 2772 taskeng.exe 43 PID 2772 wrote to memory of 2476 2772 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe"C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exeC:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2800
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AAEB6D47-FD0B-4DA5-B858-9B22FEC47A98} S-1-5-21-2952504676-3105837840-1406404655-1000:URUOZWGF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2244
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1976
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1176
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2476 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1532
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1896 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2
-
Filesize
323KB
MD5bbb53b948b10672b93e596bcaa4f9c28
SHA17afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0
SHA2561e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd
SHA512d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2