Analysis
-
max time kernel
287s -
max time network
311s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
15-01-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
Resource
win10-20231215-en
General
-
Target
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe
-
Size
324KB
-
MD5
d34e21cf5e2cdae88ff3ec4048014f1f
-
SHA1
f2fd9025fda77aed7bfb5b9d58c02ad33fd5cefe
-
SHA256
6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73
-
SHA512
f1441435a3bd134dcfbea1ddbca2e81698612f4de1ac38806cd7dde8e93d3a65f6f2d09b15c634eb33f0bf9c1ea052d39f513872f9a37d4bb36a28ea4b2c50eb
-
SSDEEP
6144:eKlzr1sYCzek2ciDaP9Xk6Ln1W8W/9InBSkZZmLdGcAdgdY6RKpjS:eGhQ2ciDq9ZL1W8q9InBRqELdolRKpj
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 3020 oobeldr.exe 436 oobeldr.exe 420 oobeldr.exe 4812 oobeldr.exe 4452 oobeldr.exe 4024 oobeldr.exe 508 oobeldr.exe 4504 oobeldr.exe 2548 oobeldr.exe 2676 oobeldr.exe 4656 oobeldr.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3392 set thread context of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3020 set thread context of 420 3020 oobeldr.exe 78 PID 4812 set thread context of 4452 4812 oobeldr.exe 82 PID 4024 set thread context of 508 4024 oobeldr.exe 84 PID 4504 set thread context of 2548 4504 oobeldr.exe 86 PID 2676 set thread context of 4656 2676 oobeldr.exe 88 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 604 schtasks.exe 2200 schtasks.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 3392 wrote to memory of 200 3392 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 73 PID 200 wrote to memory of 604 200 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 74 PID 200 wrote to memory of 604 200 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 74 PID 200 wrote to memory of 604 200 6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe 74 PID 3020 wrote to memory of 436 3020 oobeldr.exe 77 PID 3020 wrote to memory of 436 3020 oobeldr.exe 77 PID 3020 wrote to memory of 436 3020 oobeldr.exe 77 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 3020 wrote to memory of 420 3020 oobeldr.exe 78 PID 420 wrote to memory of 2200 420 oobeldr.exe 79 PID 420 wrote to memory of 2200 420 oobeldr.exe 79 PID 420 wrote to memory of 2200 420 oobeldr.exe 79 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4812 wrote to memory of 4452 4812 oobeldr.exe 82 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4024 wrote to memory of 508 4024 oobeldr.exe 84 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 4504 wrote to memory of 2548 4504 oobeldr.exe 86 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88 PID 2676 wrote to memory of 4656 2676 oobeldr.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exeC:\Users\Admin\AppData\Local\Temp\6e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73.exe2⤵
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:604
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:436
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
PID:2200
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:508
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Executes dropped EXE
PID:4656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
789B
MD5db5ef8d7c51bad129d9097bf953e4913
SHA18439db960aa2d431bf5ec3c37af775b45eb07e06
SHA2561248e67f10b47b397af3c8cbe342bad4be75c68b8e10f4ec6341195cc3138bd9
SHA51204572485790b25e1751347e43b47174051cd153dd75fd55ee5590d25a2579f344cd96cf86cf45bdb7759e3e6d0f734d0ff717148ca70f501b9869e964e036fee
-
Filesize
324KB
MD5d34e21cf5e2cdae88ff3ec4048014f1f
SHA1f2fd9025fda77aed7bfb5b9d58c02ad33fd5cefe
SHA2566e2fc10f3f8c465979d095d25b2c2255917cbcc3f42878a0add10127a581ae73
SHA512f1441435a3bd134dcfbea1ddbca2e81698612f4de1ac38806cd7dde8e93d3a65f6f2d09b15c634eb33f0bf9c1ea052d39f513872f9a37d4bb36a28ea4b2c50eb