Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SOA.exe
-
Size
450KB
-
MD5
f2a45dd3bf1205ff6053bbdd90665946
-
SHA1
0b8a2c567a1a896821f8a62b04b9a4ba0a7d1009
-
SHA256
3305e88d2594770eced662a94933358d2d1d57534aebb9c6b7876e50de58a8a1
-
SHA512
de27e1bd31e96c1f720c4371eb63e3cebc18447247099d0f789f1d4479a167b2d932e0144e15bbf14a2de3ae766a7476f29649bb3371e270b4cca446fe0710c9
Score
9/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1512 set thread context of 1800 1512 SOA.exe 27 PID 1800 set thread context of 1316 1800 SOA.exe 20 PID 1800 set thread context of 1316 1800 SOA.exe 20 PID 608 set thread context of 1316 608 raserver.exe 20 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 SOA.exe Token: SeDebugPrivilege 608 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1800 SOA.exe 1800 SOA.exe 1800 SOA.exe 1800 SOA.exe 608 raserver.exe 608 raserver.exe -
Deletes itself 1 IoCs
pid Process 860 cmd.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools SOA.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1512 wrote to memory of 1800 1512 SOA.exe 27 PID 1316 wrote to memory of 608 1316 Explorer.EXE 28 PID 1316 wrote to memory of 608 1316 Explorer.EXE 28 PID 1316 wrote to memory of 608 1316 Explorer.EXE 28 PID 1316 wrote to memory of 608 1316 Explorer.EXE 28 PID 608 wrote to memory of 860 608 raserver.exe 29 PID 608 wrote to memory of 860 608 raserver.exe 29 PID 608 wrote to memory of 860 608 raserver.exe 29 PID 608 wrote to memory of 860 608 raserver.exe 29 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1800 SOA.exe 1800 SOA.exe 1800 SOA.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe 608 raserver.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE 1316 Explorer.EXE -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SOA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SOA.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions SOA.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SOA.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 SOA.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Suspicious use of SendNotifyMessage
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"2⤵
- Suspicious use of SetThreadContext
- Looks for VMWare Tools registry key
- Suspicious use of WriteProcessMemory
- Checks BIOS information in registry
- Looks for VirtualBox Guest Additions in registry
- Maps connected drives based on registry
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:608 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SOA.exe"3⤵
- Deletes itself
PID:860
-
-