Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
SOA.exe
-
Size
390KB
-
MD5
57fc2930bc260b400169be12fa4307c7
-
SHA1
fbe7fce8c58cc24cfce70d7a7c69b4955be5e751
-
SHA256
e35bc80003b03fd590bc5e94f45857e3a5bddb495af688aed92f2ba790a90f48
-
SHA512
e2e941bfa7a88a0d655e48b656104f581bce3e2bebe8f2feb43551aeb2eed5613bf19d022cd852bdd24cb11a9a936b36e7e47ab254c7519310cd8064a24a291e
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
bigboy5570@@@@
Signatures
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 792 wrote to memory of 3880 792 SOA.exe 66 PID 792 wrote to memory of 3880 792 SOA.exe 66 PID 792 wrote to memory of 3880 792 SOA.exe 66 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 PID 792 wrote to memory of 3852 792 SOA.exe 68 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 792 set thread context of 3852 792 SOA.exe 68 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 792 SOA.exe Token: SeDebugPrivilege 3852 RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 792 SOA.exe 3852 RegSvcs.exe 3852 RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3880 schtasks.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CpHVtKvyKqlep" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7990.tmp"2⤵
- Creates scheduled task(s)
PID:3880
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3852
-