Analysis
-
max time kernel
289s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
Resource
win10-20231215-en
General
-
Target
1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe
-
Size
323KB
-
MD5
d790a919758ac20f6733ff419f5c9273
-
SHA1
7e81dc3ec43bb25dcd2a193907f5edb879e103d2
-
SHA256
1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99
-
SHA512
7fe99230f0c602d11baabae1615203b537eda40230fca36d49839d97a20f0bac4b12003ce05890687b0543caca34df11e9509df02fb5d2d7e0ab52274621af1f
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 2532 oobeldr.exe 2100 oobeldr.exe 1428 oobeldr.exe 2448 oobeldr.exe 2052 oobeldr.exe 2096 oobeldr.exe 1736 oobeldr.exe 2080 oobeldr.exe 2492 oobeldr.exe -
Loads dropped DLL 7 IoCs
pid Process 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe 1016 WerFault.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1680 set thread context of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 2532 set thread context of 2100 2532 oobeldr.exe 33 PID 1428 set thread context of 2448 1428 oobeldr.exe 39 PID 2052 set thread context of 2096 2052 oobeldr.exe 41 PID 1736 set thread context of 2080 1736 oobeldr.exe 44 -
Program crash 1 IoCs
pid pid_target Process procid_target 1016 2096 WerFault.exe 41 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe 2812 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 1680 wrote to memory of 2284 1680 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 28 PID 2284 wrote to memory of 2616 2284 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 30 PID 2284 wrote to memory of 2616 2284 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 30 PID 2284 wrote to memory of 2616 2284 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 30 PID 2284 wrote to memory of 2616 2284 1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe 30 PID 2468 wrote to memory of 2532 2468 taskeng.exe 32 PID 2468 wrote to memory of 2532 2468 taskeng.exe 32 PID 2468 wrote to memory of 2532 2468 taskeng.exe 32 PID 2468 wrote to memory of 2532 2468 taskeng.exe 32 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2532 wrote to memory of 2100 2532 oobeldr.exe 33 PID 2100 wrote to memory of 2812 2100 oobeldr.exe 37 PID 2100 wrote to memory of 2812 2100 oobeldr.exe 37 PID 2100 wrote to memory of 2812 2100 oobeldr.exe 37 PID 2100 wrote to memory of 2812 2100 oobeldr.exe 37 PID 2468 wrote to memory of 1428 2468 taskeng.exe 38 PID 2468 wrote to memory of 1428 2468 taskeng.exe 38 PID 2468 wrote to memory of 1428 2468 taskeng.exe 38 PID 2468 wrote to memory of 1428 2468 taskeng.exe 38 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 1428 wrote to memory of 2448 1428 oobeldr.exe 39 PID 2468 wrote to memory of 2052 2468 taskeng.exe 40 PID 2468 wrote to memory of 2052 2468 taskeng.exe 40 PID 2468 wrote to memory of 2052 2468 taskeng.exe 40 PID 2468 wrote to memory of 2052 2468 taskeng.exe 40 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2052 wrote to memory of 2096 2052 oobeldr.exe 41 PID 2096 wrote to memory of 1016 2096 oobeldr.exe 42 PID 2096 wrote to memory of 1016 2096 oobeldr.exe 42 PID 2096 wrote to memory of 1016 2096 oobeldr.exe 42 PID 2096 wrote to memory of 1016 2096 oobeldr.exe 42 PID 2468 wrote to memory of 1736 2468 taskeng.exe 43 PID 2468 wrote to memory of 1736 2468 taskeng.exe 43 PID 2468 wrote to memory of 1736 2468 taskeng.exe 43 PID 2468 wrote to memory of 1736 2468 taskeng.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe"C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exeC:\Users\Admin\AppData\Local\Temp\1f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2616
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {08723E3F-1846-48EB-B1C9-5F3DE5B6A657} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:2812
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2448
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1164⤵
- Loads dropped DLL
- Program crash
PID:1016
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1736 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2080
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵PID:2544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD532e07c0112236a999f23357b7711193b
SHA19c472356363714debc01b9c834917fdda0c08a40
SHA256a6950c98915f6b51bcc14a51a9dd1eacac5b71c4bd6279c002e38e954fd716f8
SHA51233fd4faf1c535550b532d2dc2a72697f48821791c4e8f4fb37e82abaa58b76f8a2851f268ce1fda683f7a1caea6b0b40c8de7377d11cf07f112f04ad39ae72aa
-
Filesize
323KB
MD5d790a919758ac20f6733ff419f5c9273
SHA17e81dc3ec43bb25dcd2a193907f5edb879e103d2
SHA2561f570c4a84def50f70c4505b6f7ecec8dc14bbb8a6517749a901c63048dfee99
SHA5127fe99230f0c602d11baabae1615203b537eda40230fca36d49839d97a20f0bac4b12003ce05890687b0543caca34df11e9509df02fb5d2d7e0ab52274621af1f
-
Filesize
176KB
MD59813ae4b46cf917c5b4a217598defc4b
SHA179a1b9d4afbe1e11fe3e59e534e657b019880f48
SHA25649c52334f71fd4fd42a4539582c8cca00f259735712882338b9667b2376efc98
SHA512178728882c9fddb48928d61e8e83dd5926427308418224309e3a41b77b613273f41b8f77cdeec153bfbbab3a3a3a9df194dc7ae0f80bb7ee1ec9f3b54e0ea18d
-
Filesize
18KB
MD5955b83b9b309e73ffab2d3a08509c291
SHA171540d33c2dc54fe3ba103ed752683a157315cda
SHA25679f48a16634108d1e5ddacdc62b3a86ce8fde8fd3afdca66dc0b727ff07fb4b9
SHA512a8fa382a232643ea731b471d3dd27b6d5a71cb7c6b78af0a24d88e791279b865a7563e325b53f4d30fb7b1f1498229405de5b40ac8b8b59470140d75f4659863
-
Filesize
36KB
MD5f7de18cb73b6a1c9b353ee31b432b403
SHA10675d3979ef5c650ff3ceacd0939ece96e9cf751
SHA2560412fece30ff5b81716300da77ea02cd3eb4d9f04e9949581c4838411677b6fa
SHA512f21c7ec093ac109ef9a9fb2ce3522dcd33a5fb5a108e2c91be48c17cabd6fbd81df5e5563806711d993be20d6f4400e44e2b7f795ca00774388ca0e4f2eb3d5e
-
Filesize
114KB
MD5cea548602bd301f4478c12085b9c10bb
SHA15f9a63893a3563f6b33284bb6f4f294f4e0f042e
SHA256e9b7988bd6b24812b090e4540586b60a301a828339b516c6160aaf8d09ce883b
SHA512feb065fc5f49861e9d4b1862d497916d4e5e7b71419048d37639e112ee7be9dfed9be5345b05e73a154fedada5dfdfa152cd7925afdac12df440579e969ba585
-
Filesize
1KB
MD5a1fb56a694a456f25d8e0aa092bb3e25
SHA1d364de1993b4a04b59fced77a6613e2fe2163bd3
SHA2566515d81e5c76b8e1e2d1610cf061d2de49216e7a8dc5c8a72662aff9b780bb58
SHA512ceef30f1d693d3a082c17dd36b2ae98b0a82a79580abb87f5de4d504de4099ce066f444a410b95aaa60e8000cf3ca7092c7ab4fbc1a7672194ed7e768e370700
-
Filesize
52KB
MD5e8297f5ad5d82835d9d9c364abb67501
SHA15a7fd87de0d035fcec7dc3dfffb946d6ad01cfa3
SHA25642f04bdcdf5cd533729e15e1fa705fedc98abec3ab2c6f99de3bf9546b79e557
SHA512014b00103742d6cd915910666818e81de0ee964853cc8996dc00609c13e7a6c12c8e7b3277201aea012068cd9447e148e43772d1a9122fcad8b4aba0ccc0d65e
-
Filesize
37KB
MD5dae5ce9c8c1348495463ec407bcde3fc
SHA173a45509885ddb35d818a73d1a6f98d4fa379cc5
SHA25618d65963fb929b4637f5107fc5534be42d6fa7a4ade7f6d70f54a55c8fb14879
SHA512693db3f2979bc1879f8600e53df40d920147bcffeb2dda89f2dfe3195402e9944e41cf230a9a188a5a65f2fd616224b9e9136bd17b631cf2148baff162aed1db
-
Filesize
31KB
MD52731912b7bc638b808ac49f05e751ff5
SHA1c91350dbaaf4dee21d2cfaa22936625376f2cc1e
SHA256c174461edd043b3e9b6d0a087e88da7af937fa91952b95ec326f7d759fb89ea2
SHA5123614f90182b9682faf28072f75262d95f57f8144e6fa3eb2b62eafa25e5821c048bf206679c7aa897a57b86349bac7c4d990225feb6dc6fa57cd357a92e8ceeb
-
Filesize
61KB
MD591ab03504c265eb53ed892c24591642c
SHA1644b0ecec969d34a6945c3e0a5d594444585a468
SHA2569e3237bed8798fa9cad5e1f93bcc9c3122680c0eb96c49fa9bd09695133fb59a
SHA5129c5e1fee91f142f71833e3d6a0f441922f4677b12a00b73a3d53717721ad02f3479cd97cf57ed983b829627fec83edbd64a41268c247b5ed78ccbed97796e42d
-
Filesize
150KB
MD58d89092ddc0c142201ad05aa9d92446d
SHA1cf17c613a9977184b698d2896b9d5d662070cef6
SHA256778f1b2b83360905db2209aa987467ea13a00f78470b8c4c2f02e0c5dd7b6033
SHA512119f47a6b9756334321130d2781661930252b43dce160d7f8c5b2362e12e6517720962c808c1bef79b4539d78812bf0cb74d767a5d41d4c211cffcca6bd52846
-
Filesize
104KB
MD5f7614e8717f0a74d570b0af4b5579112
SHA1c646c9b9b2b8ec12bc80f18a3a024bfbaea809eb
SHA256c13c3db6a7b00a448477fe59392741af1d8d22136946584ce9d1a5deac073c8e
SHA512b6effd70c100bb41bc0fa3bbf027c60d4fbed37fa6bf58cf590dce946bc2f5e97112e4ac2cc3329e2ce1e2dc148d23c4b544d04cfca79c35db6ab35caf51920f
-
Filesize
66KB
MD5d5162c09d7149ab3a5bf106fe796f440
SHA18a26c764e23f725b552758daf98b5b31f458dc41
SHA25618235ec58a02f2ef092b81f62e85913f5bef25fba3f9866c401f0d9b6adc4f7e
SHA512f1bcee36fc7954261096711804658042ec7a66f35a2c94e4650eeb61ea0129160d8b4210f8282ccf224f50df7c23d6c6fe4ed141e29b761ba436ba5760065501
-
Filesize
5KB
MD573b20fa98d81dea2f2a6f6bd7622ec54
SHA1881b68dfbe8f8c0d99b6028d25cee3c7da9f4531
SHA256f34246815b0c3a54b9c8aaa7d2ae5ef089318397cdbe8ee70d123615819c279f
SHA5127fe5790356ab8ae8f0b67fdf415c6cab01bbd225a5bdba1029f122aae6903d2ea322fdd51a6f4262e603e8f455acfc35916cd8ae5b875d232b8f04a03fe75556
-
Filesize
22KB
MD5a1d63e1cc6efa79b95cd755a384be599
SHA11b5d4e8fce738a3bc166f74d77ede623cd2959d7
SHA25667da4f2e6d3f3459a7132bde7b1791c27b606bae68a0aaa5142734e273a9ad00
SHA512d2bf60844bf8b7ccbd0f1f7fa3a8d50048113cf0e73d2b2f3d0fba3bf02df4d3b49beff5f0acb3250b90eb68daf8e3a5733b5933b9fab4098cea11a5a5ad300a
-
Filesize
92KB
MD55b04c87c73c9d7a7e5e46728539ec7b4
SHA181501f05ec66543fc9b0709b97c9a3d2caee2c48
SHA25668c45b277d09b26022e58a31be2aa85bf4b077e3deb74c6e8492358ffc06b991
SHA5120e38b204416da4bb96396d56b55ac0f0ab6a1cd6d142de61546a7465c5a99cc40f20658dfab8d4a1e9f3b83c54c519ab05cf8fc5866309fbbb0730ebf6a65304