Analysis

  • max time kernel
    288s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2023 04:48

General

  • Target

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe

  • Size

    323KB

  • MD5

    bbb53b948b10672b93e596bcaa4f9c28

  • SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

  • SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

  • SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
    "C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
      C:\Users\Admin\AppData\Local\Temp\1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2800
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {AAEB6D47-FD0B-4DA5-B858-9B22FEC47A98} S-1-5-21-2952504676-3105837840-1406404655-1000:URUOZWGF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2244
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1628
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1976
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1176
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2476
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1532
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1896
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

    Filesize

    323KB

    MD5

    bbb53b948b10672b93e596bcaa4f9c28

    SHA1

    7afe0b979b09e3cfcff1c47c00c3a2bfdab35cf0

    SHA256

    1e9c0b82209640de30e0d918eaf8b91ec2c609e3dde767fb470742e02f7a31bd

    SHA512

    d3be1856110dfaa66fd69c0874cf676fd0c6e91fd983b3ddeb0cfae10ef789a9fdd94a51a16f35f7f1dbe4c19ad44f37af93abc40ceffb02b58204298c24cce2

  • memory/524-36-0x0000000000930000-0x0000000000986000-memory.dmp

    Filesize

    344KB

  • memory/524-37-0x0000000074950000-0x000000007503E000-memory.dmp

    Filesize

    6.9MB

  • memory/524-53-0x0000000074950000-0x000000007503E000-memory.dmp

    Filesize

    6.9MB

  • memory/524-38-0x0000000004870000-0x00000000048B0000-memory.dmp

    Filesize

    256KB

  • memory/1896-96-0x0000000074990000-0x000000007507E000-memory.dmp

    Filesize

    6.9MB

  • memory/1896-85-0x0000000074990000-0x000000007507E000-memory.dmp

    Filesize

    6.9MB

  • memory/1920-69-0x0000000074990000-0x000000007507E000-memory.dmp

    Filesize

    6.9MB

  • memory/1920-55-0x0000000074990000-0x000000007507E000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-90-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2220-4-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/2220-2-0x0000000006EB0000-0x0000000006F7C000-memory.dmp

    Filesize

    816KB

  • memory/2220-3-0x00000000003A0000-0x00000000003A6000-memory.dmp

    Filesize

    24KB

  • memory/2220-1-0x0000000074960000-0x000000007504E000-memory.dmp

    Filesize

    6.9MB

  • memory/2220-0-0x0000000000DB0000-0x0000000000E06000-memory.dmp

    Filesize

    344KB

  • memory/2220-14-0x0000000074960000-0x000000007504E000-memory.dmp

    Filesize

    6.9MB

  • memory/2476-82-0x0000000074950000-0x000000007503E000-memory.dmp

    Filesize

    6.9MB

  • memory/2476-72-0x0000000074950000-0x000000007503E000-memory.dmp

    Filesize

    6.9MB

  • memory/2552-20-0x00000000749A0000-0x000000007508E000-memory.dmp

    Filesize

    6.9MB

  • memory/2552-33-0x00000000749A0000-0x000000007508E000-memory.dmp

    Filesize

    6.9MB

  • memory/2552-22-0x0000000000640000-0x0000000000680000-memory.dmp

    Filesize

    256KB

  • memory/2552-21-0x0000000000930000-0x0000000000986000-memory.dmp

    Filesize

    344KB

  • memory/2736-15-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-13-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-11-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-8-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2736-5-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-6-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-7-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2736-17-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/3000-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB