Analysis
-
max time kernel
328s -
max time network
319s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe
Resource
win10-20231215-en
General
-
Target
d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe
-
Size
324KB
-
MD5
71983974c09a363ad2d923e6b519562c
-
SHA1
3e98481e38d1b77660605bffef1d8a3b5d9e9de2
-
SHA256
d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce
-
SHA512
e2a445edffd0d74843bbbb0af42c3befb44b57dc480492bf44a691bfd25a5c40367936dc48f8d90bdcd8a3ab55397f0ba85fb6ed38c35f600ea6e65b61303a76
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 1280 oobeldr.exe 1964 oobeldr.exe 336 oobeldr.exe 684 oobeldr.exe 992 oobeldr.exe 1316 oobeldr.exe 2232 oobeldr.exe 2132 oobeldr.exe 1676 oobeldr.exe 2968 oobeldr.exe 1332 oobeldr.exe 2412 oobeldr.exe 3004 oobeldr.exe 1564 oobeldr.exe 2908 oobeldr.exe 2648 oobeldr.exe 2672 oobeldr.exe 2244 oobeldr.exe 2164 oobeldr.exe 2852 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2920 set thread context of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 1280 set thread context of 2232 1280 oobeldr.exe 39 PID 2132 set thread context of 1676 2132 oobeldr.exe 43 PID 2968 set thread context of 3004 2968 oobeldr.exe 47 PID 1564 set thread context of 2244 1564 oobeldr.exe 52 PID 2164 set thread context of 2852 2164 oobeldr.exe 54 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2976 schtasks.exe 1200 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2920 wrote to memory of 2732 2920 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 29 PID 2732 wrote to memory of 2976 2732 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 30 PID 2732 wrote to memory of 2976 2732 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 30 PID 2732 wrote to memory of 2976 2732 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 30 PID 2732 wrote to memory of 2976 2732 d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe 30 PID 2536 wrote to memory of 1280 2536 taskeng.exe 33 PID 2536 wrote to memory of 1280 2536 taskeng.exe 33 PID 2536 wrote to memory of 1280 2536 taskeng.exe 33 PID 2536 wrote to memory of 1280 2536 taskeng.exe 33 PID 1280 wrote to memory of 1964 1280 oobeldr.exe 34 PID 1280 wrote to memory of 1964 1280 oobeldr.exe 34 PID 1280 wrote to memory of 1964 1280 oobeldr.exe 34 PID 1280 wrote to memory of 1964 1280 oobeldr.exe 34 PID 1280 wrote to memory of 336 1280 oobeldr.exe 35 PID 1280 wrote to memory of 336 1280 oobeldr.exe 35 PID 1280 wrote to memory of 336 1280 oobeldr.exe 35 PID 1280 wrote to memory of 336 1280 oobeldr.exe 35 PID 1280 wrote to memory of 684 1280 oobeldr.exe 36 PID 1280 wrote to memory of 684 1280 oobeldr.exe 36 PID 1280 wrote to memory of 684 1280 oobeldr.exe 36 PID 1280 wrote to memory of 684 1280 oobeldr.exe 36 PID 1280 wrote to memory of 992 1280 oobeldr.exe 37 PID 1280 wrote to memory of 992 1280 oobeldr.exe 37 PID 1280 wrote to memory of 992 1280 oobeldr.exe 37 PID 1280 wrote to memory of 992 1280 oobeldr.exe 37 PID 1280 wrote to memory of 1316 1280 oobeldr.exe 38 PID 1280 wrote to memory of 1316 1280 oobeldr.exe 38 PID 1280 wrote to memory of 1316 1280 oobeldr.exe 38 PID 1280 wrote to memory of 1316 1280 oobeldr.exe 38 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 1280 wrote to memory of 2232 1280 oobeldr.exe 39 PID 2232 wrote to memory of 1200 2232 oobeldr.exe 40 PID 2232 wrote to memory of 1200 2232 oobeldr.exe 40 PID 2232 wrote to memory of 1200 2232 oobeldr.exe 40 PID 2232 wrote to memory of 1200 2232 oobeldr.exe 40 PID 2536 wrote to memory of 2132 2536 taskeng.exe 42 PID 2536 wrote to memory of 2132 2536 taskeng.exe 42 PID 2536 wrote to memory of 2132 2536 taskeng.exe 42 PID 2536 wrote to memory of 2132 2536 taskeng.exe 42 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2132 wrote to memory of 1676 2132 oobeldr.exe 43 PID 2536 wrote to memory of 2968 2536 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe"C:\Users\Admin\AppData\Local\Temp\d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exeC:\Users\Admin\AppData\Local\Temp\d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2976
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {860A219C-4683-4724-BDBE-413913EB9AAB} S-1-5-21-3308111660-3636268597-2291490419-1000:JUBFGPHD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1964
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:336
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:684
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:992
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1316
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:1200
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1676
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2968 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1332
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2412
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:3004
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1564 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2908
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2648
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2244
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2164 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD571983974c09a363ad2d923e6b519562c
SHA13e98481e38d1b77660605bffef1d8a3b5d9e9de2
SHA256d64308d99047b41fe8b57d52b40c55f76b1797833d15e112f9f42f576497c3ce
SHA512e2a445edffd0d74843bbbb0af42c3befb44b57dc480492bf44a691bfd25a5c40367936dc48f8d90bdcd8a3ab55397f0ba85fb6ed38c35f600ea6e65b61303a76