Analysis

  • max time kernel
    267s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 04:52

General

  • Target

    608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe

  • Size

    324KB

  • MD5

    cd3fe09d482fd1f94e40cc827f435f2b

  • SHA1

    e4a896967bca28f203221972674d4b0d3c214a00

  • SHA256

    608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd

  • SHA512

    18cfd48356726af4d81b9909a0beb5cb17698ca8a08dea22c06aa67707e9518d4b39261add14315abd0cb255232760cfdcaa0288e33db04e66e7ca869edc09bb

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 12 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
    "C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
      C:\Users\Admin\AppData\Local\Temp\608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2888
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {AEB783E9-F013-4E66-923A-BB586E3EB99D} S-1-5-21-3818056530-936619650-3554021955-1000:SFVRQGEO\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          4⤵
          • Creates scheduled task(s)
          PID:780
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:1580
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:796
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2480
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1748
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2116
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:2924
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        3⤵
        • Executes dropped EXE
        PID:2764
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    PID:2624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          29KB

          MD5

          ef6688ed7fafd2effa4088f54a580fed

          SHA1

          0c29191fee9b6f829bbf9d78b02fc8d34088adf9

          SHA256

          7ee32c558b1701987040601ebaa389f92fd2f2ac7bf84b23adc88196a8024918

          SHA512

          52d544aa02dce063bc7eca8be3439797054c14473d97866ac8c894d9db5ce2d961ea18ab4f22c359e1bf7cbf2f3c3bd803e185515b00517c882d72db0611bab6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          35KB

          MD5

          6837a2fee2a12af30cac075e655aa196

          SHA1

          d60e086dbb8800336c8dc1e32e343c387cbef3fe

          SHA256

          a1d9407ebdd26e69d1fbb8524b87ad86c8e1b8dbe9e6606796142e812a0d2135

          SHA512

          32ed3732a768e65ae6bf808bf4be2f32ffb5512354587c24c1f257fb32814f823358463355e1c9274a7404bc7553051eafbbbc152df1ee4a5acfb0316975f7f6

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          144KB

          MD5

          8ceadafd4c830fdcbeb848fbacf5e4e4

          SHA1

          ba86e1f44cf9ad51fe9e9ad71896f79bd19a28ec

          SHA256

          2060d1130b1152f8fdb16b4e021ffe0507a877e29b299dcf8e73177baf061fe4

          SHA512

          08c1c071f1f1a8e431b2d5f56737cd9cde4c6ae87afae81a8a022c240e927818980462a71c4b0abf9d727ca490466fabfaa7f48e6d7291314aa570b33cc85261

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          154KB

          MD5

          88fd4155196e096857de286f7d5c6b3f

          SHA1

          9ec8c83d710da7573f48478ec703dcc3ff206ba9

          SHA256

          197bdeddd31bf65b50f6d9cbe3b33a0125e940672f8706e55fcb209eb988ebac

          SHA512

          4f8c0714107a31378957276a95779870bddf9003f7036dfc23eed6424cb406a7e9209e789a3635bc9af952a8035d29968def228aae5da3e1ce762fa743e82a65

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          54KB

          MD5

          38ededbb3c27638b80a0e125353c7cf9

          SHA1

          ad9a92364c09eea7f58d9e4be484c884665b978f

          SHA256

          19cd806b721a27dd40e4fc23532b87d38470970c3b3e52042028f74fccb7e803

          SHA512

          04060fceb9c0cb83316a312556f63596f5094352ae0fc91c83e46fdcc609634fcf54e4ab7fc09fed8c51b7cfd3e5acaf54c31f14039f571e9d05d2da6abe247b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          60KB

          MD5

          09f7dced64d3bd4c52860a1b3b3d2a3b

          SHA1

          02496ee761b40a653f28f0c3f9687c3b76ed7a5a

          SHA256

          bd76025fcc0294777fca38a5c7be9a3ec61b37dae23084d7e21aa2b861a33352

          SHA512

          e33bcd22d36665186ea5abb8e40e475f37413510eec8587679d1975baebf6e1606e4305fd53a76b065d7215b1ae1e752792c8b51cefcc1b471ac6f7ba96904eb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          40KB

          MD5

          592ee1ae1896142c5d337063f7d8932c

          SHA1

          b59c50ccb1edd1a054d4b41c4072dd703720be55

          SHA256

          b4d2236c58d6aec30c11c94343ab03c3b825082ca0bc7aa0fe9cfc7924720333

          SHA512

          5df508d8fd4ebf8513dd8884b64f331d18dc1c4993d7f9b91d08bf31402705836addee7ea0bd79950cbe5d861f939432f9120d03ef08f2a8833b4a5ebfcaf32f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          76KB

          MD5

          8c9b0a18368a71d3f0702a9a35943cf7

          SHA1

          3e114fe70eb82583294e4a424b4ec67ac3d7c476

          SHA256

          e18f53319a49835e3e62309179db70f27ba90c4dc8eda19fd6f14c87867a55c7

          SHA512

          cce64aa3cefa6e2c324912698a175b3424f515a9084ab4fe973ff411a737743835b38a3a782d6f222a478a40f13c696feefffe88333ff514d3d604451fce477f

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          57KB

          MD5

          37bac3ce1133d7e974ef36a91479599e

          SHA1

          8862b7fc2d617879e70576b66ee5327647cab02e

          SHA256

          aa508d4c40896aad2b80c0eb51fa9448d0739eb8f3dd9a5d31679cff8b0452dd

          SHA512

          8a6ac42188d6396ccf81fddf2968db15834bf65a151214e0b60d0a5220082bc291e4e3f8e1a6457449e3b7df2386eef57f738a6658eda9ea733a4ce99a16d26b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          85KB

          MD5

          f35c4f059d2565397aee70565045d5ec

          SHA1

          e89f73df284af2be43d48b42a208faa84efd7a37

          SHA256

          ad79aad1e5e0fd7bbd08323a0aaa45192093ac63d8c093854a66540916ddb9f4

          SHA512

          d073aee52d08164d5caf37dc0fd2a05b2ba79915c32acf5cdcf8f3987905126ee1f9c52b18b4eb972e28990471e94c6173daf88fceb18b1d88ca628f5c0e82bb

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          308KB

          MD5

          f28d5a19e437ca66c55452699e8a52e7

          SHA1

          a100e0a401a8e67215d88950fe4c1104d74a246d

          SHA256

          c123f8b83931f8505f3ddb032fa1faf08fa5c1747c302a2b267361114be2f8fb

          SHA512

          7cb3266a1422ce71556ac7774c3ae52e171e3d6576af280575dc2519454b582998e2b6de8b8df2fcd4592789b5de737a42c9fde45742aeaeff8c8130e1f553f9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          191KB

          MD5

          0dbac085de8f4c6b0aa0210a4a7e282a

          SHA1

          0d734568b4a9c13396625149e3a3a33d89cb90a5

          SHA256

          4c9ae0cc92f1c6befd11f8a5bcb0bc09c0ea6d96e63b0e47d9c5a1787c71c83b

          SHA512

          8d3e0e59baf5019d4ec1b88edbbb43bfe57b93d230831bd51cebb578083d29d24f643cd6f0b027cdedaed4e94d68f92082a41e61de7bc939b60a63c9c3e2b94b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

          Filesize

          324KB

          MD5

          cd3fe09d482fd1f94e40cc827f435f2b

          SHA1

          e4a896967bca28f203221972674d4b0d3c214a00

          SHA256

          608384aa275db4a8ee1cb4103c0233d41bdceb9175f1a7bbea746915784d1abd

          SHA512

          18cfd48356726af4d81b9909a0beb5cb17698ca8a08dea22c06aa67707e9518d4b39261add14315abd0cb255232760cfdcaa0288e33db04e66e7ca869edc09bb

        • memory/1708-20-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-17-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-7-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-9-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-11-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/1708-15-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1708-5-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB

        • memory/1748-76-0x0000000074570000-0x0000000074C5E000-memory.dmp

          Filesize

          6.9MB

        • memory/1748-87-0x0000000074570000-0x0000000074C5E000-memory.dmp

          Filesize

          6.9MB

        • memory/1808-60-0x0000000074570000-0x0000000074C5E000-memory.dmp

          Filesize

          6.9MB

        • memory/1808-43-0x0000000000040000-0x0000000000096000-memory.dmp

          Filesize

          344KB

        • memory/1808-44-0x0000000074570000-0x0000000074C5E000-memory.dmp

          Filesize

          6.9MB

        • memory/1808-45-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1856-62-0x00000000738F0000-0x0000000073FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/1856-73-0x00000000738F0000-0x0000000073FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2116-81-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2688-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2816-23-0x0000000000040000-0x0000000000096000-memory.dmp

          Filesize

          344KB

        • memory/2816-25-0x0000000002020000-0x0000000002060000-memory.dmp

          Filesize

          256KB

        • memory/2816-24-0x00000000742F0000-0x00000000749DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2816-40-0x00000000742F0000-0x00000000749DE000-memory.dmp

          Filesize

          6.9MB

        • memory/2924-89-0x00000000738F0000-0x0000000073FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2924-100-0x00000000738F0000-0x0000000073FDE000-memory.dmp

          Filesize

          6.9MB

        • memory/2932-0-0x00000000009E0000-0x0000000000A36000-memory.dmp

          Filesize

          344KB

        • memory/2932-18-0x00000000749E0000-0x00000000750CE000-memory.dmp

          Filesize

          6.9MB

        • memory/2932-4-0x0000000004AF0000-0x0000000004B30000-memory.dmp

          Filesize

          256KB

        • memory/2932-3-0x00000000003F0000-0x00000000003F6000-memory.dmp

          Filesize

          24KB

        • memory/2932-2-0x0000000004990000-0x0000000004A5C000-memory.dmp

          Filesize

          816KB

        • memory/2932-1-0x00000000749E0000-0x00000000750CE000-memory.dmp

          Filesize

          6.9MB