Analysis
-
max time kernel
138s -
max time network
32s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09/07/2020, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SOA.exe
-
Size
390KB
-
MD5
57fc2930bc260b400169be12fa4307c7
-
SHA1
fbe7fce8c58cc24cfce70d7a7c69b4955be5e751
-
SHA256
e35bc80003b03fd590bc5e94f45857e3a5bddb495af688aed92f2ba790a90f48
-
SHA512
e2e941bfa7a88a0d655e48b656104f581bce3e2bebe8f2feb43551aeb2eed5613bf19d022cd852bdd24cb11a9a936b36e7e47ab254c7519310cd8064a24a291e
Score
7/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1772 1400 SOA.exe 26 PID 1400 wrote to memory of 1772 1400 SOA.exe 26 PID 1400 wrote to memory of 1772 1400 SOA.exe 26 PID 1400 wrote to memory of 1772 1400 SOA.exe 26 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1716 1400 SOA.exe 28 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 PID 1400 wrote to memory of 1764 1400 SOA.exe 29 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1400 SOA.exe Token: SeDebugPrivilege 1764 RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1400 SOA.exe 1400 SOA.exe 1764 RegSvcs.exe 1764 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 1764 1400 SOA.exe 29 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1772 schtasks.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:1400 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CpHVtKvyKqlep" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6A27.tmp"2⤵
- Creates scheduled task(s)
PID:1772
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵PID:1716
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1764
-