Analysis
-
max time kernel
114s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe
Resource
win7-20240903-en
General
-
Target
45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe
-
Size
1.8MB
-
MD5
dd423589244daa6d2710aeda78a95cd0
-
SHA1
4d007d6895731c87c820971be427c9739978ee6c
-
SHA256
45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303
-
SHA512
7bac06f37926e58a93ce4ca7eec0d08fb9ecb811ebb0e8e522f8ec5702f5fcdb9cac2e3ff1a8373a079ef77f446048c96bfe3a8b3ac2434ae4661e54450f40aa
-
SSDEEP
49152:AiSzCD+K95aLs7zeqLTVtXtHFIDP8EehiM8qZA:AiSzCD+K95aUeqFtXtHwEEehig
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Executes dropped EXE 1 IoCs
pid Process 4652 oobeldr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 4652 oobeldr.exe 4652 oobeldr.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oobeldr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2924 schtasks.exe 1344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 4652 oobeldr.exe 4652 oobeldr.exe 4652 oobeldr.exe 4652 oobeldr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 640 wrote to memory of 2924 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 82 PID 640 wrote to memory of 2924 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 82 PID 640 wrote to memory of 2924 640 45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe 82 PID 4652 wrote to memory of 1344 4652 oobeldr.exe 85 PID 4652 wrote to memory of 1344 4652 oobeldr.exe 85 PID 4652 wrote to memory of 1344 4652 oobeldr.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe"C:\Users\Admin\AppData\Local\Temp\45c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5dd423589244daa6d2710aeda78a95cd0
SHA14d007d6895731c87c820971be427c9739978ee6c
SHA25645c8fadbc4ffceb35901be762d4ac3a1381c8a72121e7bb20167b9a0a087d303
SHA5127bac06f37926e58a93ce4ca7eec0d08fb9ecb811ebb0e8e522f8ec5702f5fcdb9cac2e3ff1a8373a079ef77f446048c96bfe3a8b3ac2434ae4661e54450f40aa