Analysis

  • max time kernel
    295s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 04:53

General

  • Target

    6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe

  • Size

    324KB

  • MD5

    d34e21cf5e2cdae88ff3ec4048014f1f

  • SHA1

    f2fd9025fda77aed7bfb5b9d58c02ad33fd5cefe

  • SHA256

    6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73

  • SHA512

    f1441435a3bd134dcfbea1ddbca2e81698612f4de1ac38806cd7dde8e93d3a65f6f2d09b15c634eb33f0bf9c1ea052d39f513872f9a37d4bb36a28ea4b2c50eb

  • SSDEEP

    6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
    "C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
      C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
      2⤵
        PID:1712
      • C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
        C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2552
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {968ED241-18BB-4668-9F09-030E8FB676D2} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2960
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:2188
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 116
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1756
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Windows\SysWOW64\schtasks.exe
            /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
            4⤵
            • Creates scheduled task(s)
            PID:1552
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:1944
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2196
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
          • Executes dropped EXE
          PID:1892
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
        2⤵
        • Executes dropped EXE
        PID:2620
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
          3⤵
            PID:2516

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              102KB

              MD5

              db5d7db73caa8fbdfec6c9634441af56

              SHA1

              d8780c6a06194dc9f20470e654edc8ba99307452

              SHA256

              d5d7ad5826ea2fcf1b02874e6c4a452c42d1bf6752d42d899e0407f3b8ed3b11

              SHA512

              3b14debd2e049af885f0fbc98506c5d5a4a11005e00b5b1990674048bd889ea41832f70f7500f07ecabed9861219332df9ce48da4f0efc2e9ed798a1979dbe7a

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              21KB

              MD5

              b53a7d6aa4cc435e1b5ad8e6cc0a8ad6

              SHA1

              6426d1cbd3917972aea46071c1c44d52005848c8

              SHA256

              63cbfb7475fa40eb1b639f1a6f62ac4d7f3621769d525b3792806eb435d0a1d4

              SHA512

              26d9ae3c240f053126cc2fc97b4568a279d83e7828b9badfe730d56337444259313d6397f30e3e9584b251eed64f260c63246d937bbba837ce1b1d91d606d9d8

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              84KB

              MD5

              6f4e5acc96eabda07434f7a3065f4599

              SHA1

              846e4b6552d8586c92c6502c662fe5c8ba85262b

              SHA256

              c6d7209e1a5764b41c8e595c3a48da2b009996e3797025400b232629ca07bd0b

              SHA512

              8bfb4c83a4bc0481194437a7600116e50d77adbd04467dadc3abc5b39e93de3909c7fbb886498124f651b161e61d991b9ae35cce9a9327be035b8a4504b67b23

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              110KB

              MD5

              b49cf03be64f9ab2e1bdcde0c2e12e98

              SHA1

              b9441598c72ce746fcd4c496178dfa8261a1af8d

              SHA256

              7d3102dc2255bd8f69a8b95ae37c048224b266cee8153b45a69542a63c272da7

              SHA512

              929bc092fb0f04ee35500dd2179a2f30c1b3c8901ffa5261ad609498fd3101561fe750ec39b0666e4a708e9306c5a442f37c404dd45c8d2c5a903e10e6f94b09

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              61KB

              MD5

              561f01298caf8e787cf81d432bd41ced

              SHA1

              ed135cef9194b60d9e4b5488362d0702d62b1fd5

              SHA256

              f10cde927a65c335d370aa9bc46daee2c7162b59d90ed90b68127515bef03253

              SHA512

              d135f3a94c718711df21378acea17986ba082de7b1be282c0f5098643b5d3a481ee81b827dec98888f817af94d677bc219548ab6b1a85e857310073f970c8632

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              28KB

              MD5

              4318d1df47690e3fa50f80c5bea20668

              SHA1

              9a1bede72fbcf462429f46401c81fb7b6eb4cb49

              SHA256

              efff27ffb73a467990103bda449082b3215a2ce6732f59b5837f2fe0f0738546

              SHA512

              7a4a9a3e90e6f71d752a681c93aebb0bbde40104c45dc9177ee9706dd54cf3fe8242a5d66ff1cb8b65e8a71311520fb4b4b5edaf0e772ab67ea1c9466c490a35

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              63KB

              MD5

              88be1a5626e9177036e4f94ce8c4be2a

              SHA1

              396e1e080af9315d673091f1422197f8b41842bb

              SHA256

              532a35e9a7be3dca3302b5b4a014ecaf06025df8c283414afe52b64aa345fc78

              SHA512

              3efc36d57bfeff26d9d98a9038e2b7129653330e909d659f162d8d00275d66be673986b61c1097a70c13efa18ca43c3ccff0f4b44051c39d9c9e9578e98cfcea

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              115KB

              MD5

              532fd3bd693e74206efd91af39d7f2fc

              SHA1

              dab3ec5051ee68af12234f99981cb2f7265fce75

              SHA256

              49361c22cad72bd47641fffe2296d99c110ed20b89ed8d4a945e3f9624202ea1

              SHA512

              92c23ab9441bcdd99e42b4716b8a4d8e417dc5a5ba256fbba17fddc29025ae0ab6dcbe331242f58a22ab8f070328893cc1fd017cd2192edc6effe9a348cf0e9e

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              279KB

              MD5

              7f844f60f99cd0314c31c8b26c9a1174

              SHA1

              6c0462015ed93b6c72bb4f8b8a335d9787d164a3

              SHA256

              90cce56da1d7b9a18eda032751d5d83990709752e10a0df1e8e4b4b0d0827433

              SHA512

              76c3d1128be604e3963eb50e76d60d0b93b65af483ab06175be7aaf20b850b3271fb2a15e91ce2b6aef6db2f6b00099c80b4786534dbd5a0c709e6dcd4668dc6

            • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              116KB

              MD5

              bd89bcc4139b2ea6b86f1d4c499e8bf7

              SHA1

              0eaf778a3377c41e553d2389bd3d9d806e5dc171

              SHA256

              adec70d69925a52306a2e70450f536c828b89cf7a10d27a0b9fd4218eda44452

              SHA512

              10b608ae9db9f430b2b2a696aab63f7c3be6a4943fce0f770a67d1bda92e10cbc43b296c6954fec542b712387fa62a6ed4fe202245312dba6b5da8738c525c59

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              48KB

              MD5

              1a5897814a51ac3c02851c1beef046db

              SHA1

              da82ba829278a6b95548ec50e4356427891d7479

              SHA256

              69a3e860040f2dc32221d37ac6aa68e786e5a351278973f7ddc16308ed66273c

              SHA512

              5a88435fe75dd1e0a9fae9cd994b4eac8d169043dea7bcdc6ec5336f6a140a5e7149a7e89486e64a33f065434bcb66df981a492eadaff1f74580b7b5bbcc3e2f

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              113KB

              MD5

              a27272cb646e86696674a3c890b7d307

              SHA1

              d26a38899b03dcbaddfe052796fa5123f80d624f

              SHA256

              49dfdcd46a6983c8f5b4f38b354b2b120ce4717d5262223a42f024d5acc02b6c

              SHA512

              1ef4ba5bbe56b918a096c6dbeea9b6e26406b077e24f13f2ff1c38f5919cd602e2c9ecfe1eaaaea38d307b5595bf558d8dc824ca3867f30c2767b237ea5f409f

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              82KB

              MD5

              e77916edf80b6efd0416534dd0e3016c

              SHA1

              c49438e57f244372ef295744dc36c941f88b7cac

              SHA256

              b15b931cf5c9a9c8527892e335f2afb6cbe066c755407c0dfa776c1dd463ee99

              SHA512

              3c2b6960b2e253823651ca9bc1baecd84e1e3888e8e8c79e2513330e22319b3f831be7da48bf41b25675fc9fb32d1ca22670836402ea0f0f6061d770d15f47be

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              66KB

              MD5

              07db6ebefe839f768122e77c85a8d427

              SHA1

              89636e446e091785de2ffbfb5ded77b599cf17cc

              SHA256

              3d6a2627a1b76c8ba33958d06bdf4eededccd9715e0ebc6e90289613bd1d66cb

              SHA512

              7c4ddcb77b61501337093f0bce76be10f33a3db8f01e048d5bf42180d322083d6dd86dd63804a2a9536a22f47378fa2822a98af6a0ae120828419b40d0d30c76

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              67KB

              MD5

              135b92a76999af59e82acf97d0fb9f7d

              SHA1

              0fd389e9e85c894495c4ac3221e071654f5ebfa2

              SHA256

              55f76f964e0fb07aed57ef20f2041b025ec6b9cc00906f6d35dfab50529d4a0d

              SHA512

              e652a6730bfc015de1ed9dca77fbff8772bae5715477f0c40e29ad74254a8f79204847f8627a59f44d9ace59d173f430e2855b92b3e46e6f61f811f8bf57beb7

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              142KB

              MD5

              cc4571ed348559b7526be44889cd0a3b

              SHA1

              5982ebed3865874411e5666355bb8e38a1193f6d

              SHA256

              aff2cf2db37c82a59fac51d8f0134700f6aa55ab75648bcbc6a41104ed5553eb

              SHA512

              c7a5d4ee20dd50b5cc0ab675546ab5570aa0e316ad5ebc0d2de766227a36b79e65f16bede81187cc51ceb2dc55fb59b160129832753197a7987203c827fb1ed1

            • \Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe

              Filesize

              30KB

              MD5

              2a224fe435b95381c2a657ca952ca0fb

              SHA1

              e41450dff78d6e07de2b862434de6ced80fcd232

              SHA256

              2bb644dcad9eb200f816ced3f52ec59d110173018c126abedc839c17cf08a27d

              SHA512

              6a9758b85f6e427f93aac77e818be67075fef48ac38188124f3038a74b4fc86e58b71eb774973c98b88906784f453954cd15d0e7a7f732bf73af40f14c496914

            • memory/980-71-0x0000000072E00000-0x00000000734EE000-memory.dmp

              Filesize

              6.9MB

            • memory/980-59-0x0000000072E00000-0x00000000734EE000-memory.dmp

              Filesize

              6.9MB

            • memory/980-60-0x00000000048F0000-0x0000000004930000-memory.dmp

              Filesize

              256KB

            • memory/980-58-0x0000000000A20000-0x0000000000A76000-memory.dmp

              Filesize

              344KB

            • memory/1044-0-0x0000000000E60000-0x0000000000EB6000-memory.dmp

              Filesize

              344KB

            • memory/1044-14-0x0000000074990000-0x000000007507E000-memory.dmp

              Filesize

              6.9MB

            • memory/1044-1-0x0000000074990000-0x000000007507E000-memory.dmp

              Filesize

              6.9MB

            • memory/1044-2-0x0000000006BE0000-0x0000000006CAC000-memory.dmp

              Filesize

              816KB

            • memory/1044-3-0x00000000008B0000-0x00000000008B6000-memory.dmp

              Filesize

              24KB

            • memory/1044-4-0x0000000004700000-0x0000000004740000-memory.dmp

              Filesize

              256KB

            • memory/1944-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1948-6-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/1948-7-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-8-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-13-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-5-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-16-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/1948-11-0x0000000000400000-0x0000000000406000-memory.dmp

              Filesize

              24KB

            • memory/2192-56-0x00000000734F0000-0x0000000073BDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2192-45-0x0000000004B30000-0x0000000004B70000-memory.dmp

              Filesize

              256KB

            • memory/2192-43-0x0000000000A20000-0x0000000000A76000-memory.dmp

              Filesize

              344KB

            • memory/2192-44-0x00000000734F0000-0x0000000073BDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2196-73-0x00000000734F0000-0x0000000073BDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2196-83-0x00000000734F0000-0x0000000073BDE000-memory.dmp

              Filesize

              6.9MB

            • memory/2432-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

              Filesize

              4KB

            • memory/2620-86-0x0000000072E00000-0x00000000734EE000-memory.dmp

              Filesize

              6.9MB

            • memory/2960-34-0x00000000749D0000-0x00000000750BE000-memory.dmp

              Filesize

              6.9MB

            • memory/2960-21-0x00000000049A0000-0x00000000049E0000-memory.dmp

              Filesize

              256KB

            • memory/2960-19-0x0000000000A20000-0x0000000000A76000-memory.dmp

              Filesize

              344KB

            • memory/2960-20-0x00000000749D0000-0x00000000750BE000-memory.dmp

              Filesize

              6.9MB