Analysis

  • max time kernel
    289s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:20

General

  • Target

    1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe

  • Size

    323KB

  • MD5

    d790a919758ac20f6733ff419f5c9273

  • SHA1

    7e81dc3ec43bb25dcd2a193907f5edb879e103d2

  • SHA256

    1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99

  • SHA512

    7fe99230f0c602d11baabae1615203b537eda40230fca36d49839d97a20f0bac4b12003ce05890687b0543caca34df11e9509df02fb5d2d7e0ab52274621af1f

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
    "C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
      C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2616
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {08723E3F-1846-48EB-B1C9-5F3DE5B6A657} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          4⤵
          • Creates scheduled task(s)
          PID:2812
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2448
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 116
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1016
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1736
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2080
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:2492
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
          PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      100KB

      MD5

      32e07c0112236a999f23357b7711193b

      SHA1

      9c472356363714debc01b9c834917fdda0c08a40

      SHA256

      a6950c98915f6b51bcc14a51a9dd1eacac5b71c4bd6279c002e38e954fd716f8

      SHA512

      33fd4faf1c535550b532d2dc2a72697f48821791c4e8f4fb37e82abaa58b76f8a2851f268ce1fda683f7a1caea6b0b40c8de7377d11cf07f112f04ad39ae72aa

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      323KB

      MD5

      d790a919758ac20f6733ff419f5c9273

      SHA1

      7e81dc3ec43bb25dcd2a193907f5edb879e103d2

      SHA256

      1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99

      SHA512

      7fe99230f0c602d11baabae1615203b537eda40230fca36d49839d97a20f0bac4b12003ce05890687b0543caca34df11e9509df02fb5d2d7e0ab52274621af1f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      176KB

      MD5

      9813ae4b46cf917c5b4a217598defc4b

      SHA1

      79a1b9d4afbe1e11fe3e59e534e657b019880f48

      SHA256

      49c52334f71fd4fd42a4539582c8cca00f259735712882338b9667b2376efc98

      SHA512

      178728882c9fddb48928d61e8e83dd5926427308418224309e3a41b77b613273f41b8f77cdeec153bfbbab3a3a3a9df194dc7ae0f80bb7ee1ec9f3b54e0ea18d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      18KB

      MD5

      955b83b9b309e73ffab2d3a08509c291

      SHA1

      71540d33c2dc54fe3ba103ed752683a157315cda

      SHA256

      79f48a16634108d1e5ddacdc62b3a86ce8fde8fd3afdca66dc0b727ff07fb4b9

      SHA512

      a8fa382a232643ea731b471d3dd27b6d5a71cb7c6b78af0a24d88e791279b865a7563e325b53f4d30fb7b1f1498229405de5b40ac8b8b59470140d75f4659863

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      36KB

      MD5

      f7de18cb73b6a1c9b353ee31b432b403

      SHA1

      0675d3979ef5c650ff3ceacd0939ece96e9cf751

      SHA256

      0412fece30ff5b81716300da77ea02cd3eb4d9f04e9949581c4838411677b6fa

      SHA512

      f21c7ec093ac109ef9a9fb2ce3522dcd33a5fb5a108e2c91be48c17cabd6fbd81df5e5563806711d993be20d6f4400e44e2b7f795ca00774388ca0e4f2eb3d5e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      114KB

      MD5

      cea548602bd301f4478c12085b9c10bb

      SHA1

      5f9a63893a3563f6b33284bb6f4f294f4e0f042e

      SHA256

      e9b7988bd6b24812b090e4540586b60a301a828339b516c6160aaf8d09ce883b

      SHA512

      feb065fc5f49861e9d4b1862d497916d4e5e7b71419048d37639e112ee7be9dfed9be5345b05e73a154fedada5dfdfa152cd7925afdac12df440579e969ba585

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      1KB

      MD5

      a1fb56a694a456f25d8e0aa092bb3e25

      SHA1

      d364de1993b4a04b59fced77a6613e2fe2163bd3

      SHA256

      6515d81e5c76b8e1e2d1610cf061d2de49216e7a8dc5c8a72662aff9b780bb58

      SHA512

      ceef30f1d693d3a082c17dd36b2ae98b0a82a79580abb87f5de4d504de4099ce066f444a410b95aaa60e8000cf3ca7092c7ab4fbc1a7672194ed7e768e370700

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      52KB

      MD5

      e8297f5ad5d82835d9d9c364abb67501

      SHA1

      5a7fd87de0d035fcec7dc3dfffb946d6ad01cfa3

      SHA256

      42f04bdcdf5cd533729e15e1fa705fedc98abec3ab2c6f99de3bf9546b79e557

      SHA512

      014b00103742d6cd915910666818e81de0ee964853cc8996dc00609c13e7a6c12c8e7b3277201aea012068cd9447e148e43772d1a9122fcad8b4aba0ccc0d65e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      37KB

      MD5

      dae5ce9c8c1348495463ec407bcde3fc

      SHA1

      73a45509885ddb35d818a73d1a6f98d4fa379cc5

      SHA256

      18d65963fb929b4637f5107fc5534be42d6fa7a4ade7f6d70f54a55c8fb14879

      SHA512

      693db3f2979bc1879f8600e53df40d920147bcffeb2dda89f2dfe3195402e9944e41cf230a9a188a5a65f2fd616224b9e9136bd17b631cf2148baff162aed1db

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      31KB

      MD5

      2731912b7bc638b808ac49f05e751ff5

      SHA1

      c91350dbaaf4dee21d2cfaa22936625376f2cc1e

      SHA256

      c174461edd043b3e9b6d0a087e88da7af937fa91952b95ec326f7d759fb89ea2

      SHA512

      3614f90182b9682faf28072f75262d95f57f8144e6fa3eb2b62eafa25e5821c048bf206679c7aa897a57b86349bac7c4d990225feb6dc6fa57cd357a92e8ceeb

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      61KB

      MD5

      91ab03504c265eb53ed892c24591642c

      SHA1

      644b0ecec969d34a6945c3e0a5d594444585a468

      SHA256

      9e3237bed8798fa9cad5e1f93bcc9c3122680c0eb96c49fa9bd09695133fb59a

      SHA512

      9c5e1fee91f142f71833e3d6a0f441922f4677b12a00b73a3d53717721ad02f3479cd97cf57ed983b829627fec83edbd64a41268c247b5ed78ccbed97796e42d

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      150KB

      MD5

      8d89092ddc0c142201ad05aa9d92446d

      SHA1

      cf17c613a9977184b698d2896b9d5d662070cef6

      SHA256

      778f1b2b83360905db2209aa987467ea13a00f78470b8c4c2f02e0c5dd7b6033

      SHA512

      119f47a6b9756334321130d2781661930252b43dce160d7f8c5b2362e12e6517720962c808c1bef79b4539d78812bf0cb74d767a5d41d4c211cffcca6bd52846

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      104KB

      MD5

      f7614e8717f0a74d570b0af4b5579112

      SHA1

      c646c9b9b2b8ec12bc80f18a3a024bfbaea809eb

      SHA256

      c13c3db6a7b00a448477fe59392741af1d8d22136946584ce9d1a5deac073c8e

      SHA512

      b6effd70c100bb41bc0fa3bbf027c60d4fbed37fa6bf58cf590dce946bc2f5e97112e4ac2cc3329e2ce1e2dc148d23c4b544d04cfca79c35db6ab35caf51920f

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      66KB

      MD5

      d5162c09d7149ab3a5bf106fe796f440

      SHA1

      8a26c764e23f725b552758daf98b5b31f458dc41

      SHA256

      18235ec58a02f2ef092b81f62e85913f5bef25fba3f9866c401f0d9b6adc4f7e

      SHA512

      f1bcee36fc7954261096711804658042ec7a66f35a2c94e4650eeb61ea0129160d8b4210f8282ccf224f50df7c23d6c6fe4ed141e29b761ba436ba5760065501

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      5KB

      MD5

      73b20fa98d81dea2f2a6f6bd7622ec54

      SHA1

      881b68dfbe8f8c0d99b6028d25cee3c7da9f4531

      SHA256

      f34246815b0c3a54b9c8aaa7d2ae5ef089318397cdbe8ee70d123615819c279f

      SHA512

      7fe5790356ab8ae8f0b67fdf415c6cab01bbd225a5bdba1029f122aae6903d2ea322fdd51a6f4262e603e8f455acfc35916cd8ae5b875d232b8f04a03fe75556

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      22KB

      MD5

      a1d63e1cc6efa79b95cd755a384be599

      SHA1

      1b5d4e8fce738a3bc166f74d77ede623cd2959d7

      SHA256

      67da4f2e6d3f3459a7132bde7b1791c27b606bae68a0aaa5142734e273a9ad00

      SHA512

      d2bf60844bf8b7ccbd0f1f7fa3a8d50048113cf0e73d2b2f3d0fba3bf02df4d3b49beff5f0acb3250b90eb68daf8e3a5733b5933b9fab4098cea11a5a5ad300a

    • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

      Filesize

      92KB

      MD5

      5b04c87c73c9d7a7e5e46728539ec7b4

      SHA1

      81501f05ec66543fc9b0709b97c9a3d2caee2c48

      SHA256

      68c45b277d09b26022e58a31be2aa85bf4b077e3deb74c6e8492358ffc06b991

      SHA512

      0e38b204416da4bb96396d56b55ac0f0ab6a1cd6d142de61546a7465c5a99cc40f20658dfab8d4a1e9f3b83c54c519ab05cf8fc5866309fbbb0730ebf6a65304

    • memory/1428-39-0x0000000073F50000-0x000000007463E000-memory.dmp

      Filesize

      6.9MB

    • memory/1428-38-0x0000000000150000-0x00000000001A6000-memory.dmp

      Filesize

      344KB

    • memory/1428-50-0x0000000073F50000-0x000000007463E000-memory.dmp

      Filesize

      6.9MB

    • memory/1428-40-0x0000000004A90000-0x0000000004AD0000-memory.dmp

      Filesize

      256KB

    • memory/1680-3-0x00000000005E0000-0x00000000005E6000-memory.dmp

      Filesize

      24KB

    • memory/1680-2-0x0000000000740000-0x000000000080C000-memory.dmp

      Filesize

      816KB

    • memory/1680-1-0x0000000073F60000-0x000000007464E000-memory.dmp

      Filesize

      6.9MB

    • memory/1680-0-0x0000000000A00000-0x0000000000A56000-memory.dmp

      Filesize

      344KB

    • memory/1680-18-0x0000000073F60000-0x000000007464E000-memory.dmp

      Filesize

      6.9MB

    • memory/1680-4-0x0000000004AB0000-0x0000000004AF0000-memory.dmp

      Filesize

      256KB

    • memory/1736-75-0x0000000072C60000-0x000000007334E000-memory.dmp

      Filesize

      6.9MB

    • memory/1736-87-0x0000000072C60000-0x000000007334E000-memory.dmp

      Filesize

      6.9MB

    • memory/1736-74-0x0000000000150000-0x00000000001A6000-memory.dmp

      Filesize

      344KB

    • memory/1736-76-0x00000000006D0000-0x0000000000710000-memory.dmp

      Filesize

      256KB

    • memory/2052-65-0x0000000073F90000-0x000000007467E000-memory.dmp

      Filesize

      6.9MB

    • memory/2052-53-0x0000000073F90000-0x000000007467E000-memory.dmp

      Filesize

      6.9MB

    • memory/2096-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2100-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2284-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2284-15-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-20-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-17-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-11-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-9-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-7-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2284-5-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2492-89-0x0000000000150000-0x00000000001A6000-memory.dmp

      Filesize

      344KB

    • memory/2492-104-0x0000000072570000-0x0000000072C5E000-memory.dmp

      Filesize

      6.9MB

    • memory/2492-91-0x0000000004A50000-0x0000000004A90000-memory.dmp

      Filesize

      256KB

    • memory/2492-90-0x0000000072570000-0x0000000072C5E000-memory.dmp

      Filesize

      6.9MB

    • memory/2532-25-0x0000000002020000-0x0000000002060000-memory.dmp

      Filesize

      256KB

    • memory/2532-24-0x0000000073FA0000-0x000000007468E000-memory.dmp

      Filesize

      6.9MB

    • memory/2532-36-0x0000000073FA0000-0x000000007468E000-memory.dmp

      Filesize

      6.9MB

    • memory/2532-23-0x0000000000150000-0x00000000001A6000-memory.dmp

      Filesize

      344KB