Analysis
-
max time kernel
267s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
Resource
win10-20231215-en
General
-
Target
608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
-
Size
324KB
-
MD5
cd3fe09d482fd1f94e40cc827f435f2b
-
SHA1
e4a896967bca28f203221972674d4b0d3c214a00
-
SHA256
608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd
-
SHA512
18cfd48356726af4d81b9909a0beb5cb17698ca8a08dea22c06aa67707e9518d4b39261add14315abd0cb255232760cfdcaa0288e33db04e66e7ca869edc09bb
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2816 oobeldr.exe 2624 oobeldr.exe 2688 oobeldr.exe 1808 oobeldr.exe 1580 oobeldr.exe 1856 oobeldr.exe 796 oobeldr.exe 2480 oobeldr.exe 1748 oobeldr.exe 2116 oobeldr.exe 2924 oobeldr.exe 2764 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2932 set thread context of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2816 set thread context of 2688 2816 oobeldr.exe 34 PID 1808 set thread context of 1580 1808 oobeldr.exe 40 PID 1856 set thread context of 2480 1856 oobeldr.exe 43 PID 1748 set thread context of 2116 1748 oobeldr.exe 45 PID 2924 set thread context of 2764 2924 oobeldr.exe 47 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe 780 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 2932 wrote to memory of 1708 2932 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 17 PID 1708 wrote to memory of 2888 1708 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 30 PID 1708 wrote to memory of 2888 1708 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 30 PID 1708 wrote to memory of 2888 1708 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 30 PID 1708 wrote to memory of 2888 1708 608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe 30 PID 2848 wrote to memory of 2816 2848 taskeng.exe 33 PID 2848 wrote to memory of 2816 2848 taskeng.exe 33 PID 2848 wrote to memory of 2816 2848 taskeng.exe 33 PID 2848 wrote to memory of 2816 2848 taskeng.exe 33 PID 2816 wrote to memory of 2624 2816 oobeldr.exe 32 PID 2816 wrote to memory of 2624 2816 oobeldr.exe 32 PID 2816 wrote to memory of 2624 2816 oobeldr.exe 32 PID 2816 wrote to memory of 2624 2816 oobeldr.exe 32 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2816 wrote to memory of 2688 2816 oobeldr.exe 34 PID 2688 wrote to memory of 780 2688 oobeldr.exe 36 PID 2688 wrote to memory of 780 2688 oobeldr.exe 36 PID 2688 wrote to memory of 780 2688 oobeldr.exe 36 PID 2688 wrote to memory of 780 2688 oobeldr.exe 36 PID 2848 wrote to memory of 1808 2848 taskeng.exe 39 PID 2848 wrote to memory of 1808 2848 taskeng.exe 39 PID 2848 wrote to memory of 1808 2848 taskeng.exe 39 PID 2848 wrote to memory of 1808 2848 taskeng.exe 39 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 1808 wrote to memory of 1580 1808 oobeldr.exe 40 PID 2848 wrote to memory of 1856 2848 taskeng.exe 41 PID 2848 wrote to memory of 1856 2848 taskeng.exe 41 PID 2848 wrote to memory of 1856 2848 taskeng.exe 41 PID 2848 wrote to memory of 1856 2848 taskeng.exe 41 PID 1856 wrote to memory of 796 1856 oobeldr.exe 42 PID 1856 wrote to memory of 796 1856 oobeldr.exe 42 PID 1856 wrote to memory of 796 1856 oobeldr.exe 42 PID 1856 wrote to memory of 796 1856 oobeldr.exe 42 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43 PID 1856 wrote to memory of 2480 1856 oobeldr.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe"C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exeC:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2888
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AEB783E9-F013-4E66-923A-BB586E3EB99D} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"4⤵
- Creates scheduled task(s)
PID:780
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:1580
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:796
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2480
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1748 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2116
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe3⤵
- Executes dropped EXE
PID:2764
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5ef6688ed7fafd2effa4088f54a580fed
SHA10c29191fee9b6f829bbf9d78b02fc8d34088adf9
SHA2567ee32c558b1701987040601ebaa389f92fd2f2ac7bf84b23adc88196a8024918
SHA51252d544aa02dce063bc7eca8be3439797054c14473d97866ac8c894d9db5ce2d961ea18ab4f22c359e1bf7cbf2f3c3bd803e185515b00517c882d72db0611bab6
-
Filesize
35KB
MD56837a2fee2a12af30cac075e655aa196
SHA1d60e086dbb8800336c8dc1e32e343c387cbef3fe
SHA256a1d9407ebdd26e69d1fbb8524b87ad86c8e1b8dbe9e6606796142e812a0d2135
SHA51232ed3732a768e65ae6bf808bf4be2f32ffb5512354587c24c1f257fb32814f823358463355e1c9274a7404bc7553051eafbbbc152df1ee4a5acfb0316975f7f6
-
Filesize
144KB
MD58ceadafd4c830fdcbeb848fbacf5e4e4
SHA1ba86e1f44cf9ad51fe9e9ad71896f79bd19a28ec
SHA2562060d1130b1152f8fdb16b4e021ffe0507a877e29b299dcf8e73177baf061fe4
SHA51208c1c071f1f1a8e431b2d5f56737cd9cde4c6ae87afae81a8a022c240e927818980462a71c4b0abf9d727ca490466fabfaa7f48e6d7291314aa570b33cc85261
-
Filesize
154KB
MD588fd4155196e096857de286f7d5c6b3f
SHA19ec8c83d710da7573f48478ec703dcc3ff206ba9
SHA256197bdeddd31bf65b50f6d9cbe3b33a0125e940672f8706e55fcb209eb988ebac
SHA5124f8c0714107a31378957276a95779870bddf9003f7036dfc23eed6424cb406a7e9209e789a3635bc9af952a8035d29968def228aae5da3e1ce762fa743e82a65
-
Filesize
54KB
MD538ededbb3c27638b80a0e125353c7cf9
SHA1ad9a92364c09eea7f58d9e4be484c884665b978f
SHA25619cd806b721a27dd40e4fc23532b87d38470970c3b3e52042028f74fccb7e803
SHA51204060fceb9c0cb83316a312556f63596f5094352ae0fc91c83e46fdcc609634fcf54e4ab7fc09fed8c51b7cfd3e5acaf54c31f14039f571e9d05d2da6abe247b
-
Filesize
60KB
MD509f7dced64d3bd4c52860a1b3b3d2a3b
SHA102496ee761b40a653f28f0c3f9687c3b76ed7a5a
SHA256bd76025fcc0294777fca38a5c7be9a3ec61b37dae23084d7e21aa2b861a33352
SHA512e33bcd22d36665186ea5abb8e40e475f37413510eec8587679d1975baebf6e1606e4305fd53a76b065d7215b1ae1e752792c8b51cefcc1b471ac6f7ba96904eb
-
Filesize
40KB
MD5592ee1ae1896142c5d337063f7d8932c
SHA1b59c50ccb1edd1a054d4b41c4072dd703720be55
SHA256b4d2236c58d6aec30c11c94343ab03c3b825082ca0bc7aa0fe9cfc7924720333
SHA5125df508d8fd4ebf8513dd8884b64f331d18dc1c4993d7f9b91d08bf31402705836addee7ea0bd79950cbe5d861f939432f9120d03ef08f2a8833b4a5ebfcaf32f
-
Filesize
76KB
MD58c9b0a18368a71d3f0702a9a35943cf7
SHA13e114fe70eb82583294e4a424b4ec67ac3d7c476
SHA256e18f53319a49835e3e62309179db70f27ba90c4dc8eda19fd6f14c87867a55c7
SHA512cce64aa3cefa6e2c324912698a175b3424f515a9084ab4fe973ff411a737743835b38a3a782d6f222a478a40f13c696feefffe88333ff514d3d604451fce477f
-
Filesize
57KB
MD537bac3ce1133d7e974ef36a91479599e
SHA18862b7fc2d617879e70576b66ee5327647cab02e
SHA256aa508d4c40896aad2b80c0eb51fa9448d0739eb8f3dd9a5d31679cff8b0452dd
SHA5128a6ac42188d6396ccf81fddf2968db15834bf65a151214e0b60d0a5220082bc291e4e3f8e1a6457449e3b7df2386eef57f738a6658eda9ea733a4ce99a16d26b
-
Filesize
85KB
MD5f35c4f059d2565397aee70565045d5ec
SHA1e89f73df284af2be43d48b42a208faa84efd7a37
SHA256ad79aad1e5e0fd7bbd08323a0aaa45192093ac63d8c093854a66540916ddb9f4
SHA512d073aee52d08164d5caf37dc0fd2a05b2ba79915c32acf5cdcf8f3987905126ee1f9c52b18b4eb972e28990471e94c6173daf88fceb18b1d88ca628f5c0e82bb
-
Filesize
308KB
MD5f28d5a19e437ca66c55452699e8a52e7
SHA1a100e0a401a8e67215d88950fe4c1104d74a246d
SHA256c123f8b83931f8505f3ddb032fa1faf08fa5c1747c302a2b267361114be2f8fb
SHA5127cb3266a1422ce71556ac7774c3ae52e171e3d6576af280575dc2519454b582998e2b6de8b8df2fcd4592789b5de737a42c9fde45742aeaeff8c8130e1f553f9
-
Filesize
191KB
MD50dbac085de8f4c6b0aa0210a4a7e282a
SHA10d734568b4a9c13396625149e3a3a33d89cb90a5
SHA2564c9ae0cc92f1c6befd11f8a5bcb0bc09c0ea6d96e63b0e47d9c5a1787c71c83b
SHA5128d3e0e59baf5019d4ec1b88edbbb43bfe57b93d230831bd51cebb578083d29d24f643cd6f0b027cdedaed4e94d68f92082a41e61de7bc939b60a63c9c3e2b94b
-
Filesize
324KB
MD5cd3fe09d482fd1f94e40cc827f435f2b
SHA1e4a896967bca28f203221972674d4b0d3c214a00
SHA256608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd
SHA51218cfd48356726af4d81b9909a0beb5cb17698ca8a08dea22c06aa67707e9518d4b39261add14315abd0cb255232760cfdcaa0288e33db04e66e7ca869edc09bb