Analysis
-
max time kernel
112s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
17-07-2020 16:24
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SOA.exe
-
Size
682KB
-
MD5
ec2b532d9dbebba1ffcd72a8206b6d0f
-
SHA1
dda450e2d612fe24e3578e6c1b1d7e058cb94d6f
-
SHA256
42c563ce8d199292f5643e1728f6cd15c4419eb957b408f37ff066564774c50c
-
SHA512
d762a92268bb7577f884449c5016b51086108b965b485ac3dc18d6ffb0c08543b8a72a3e63600b00ef083c1433c064839454f75edab78f16be4b0e590e181476
Score
7/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 PID 1064 wrote to memory of 1320 1064 SOA.exe 24 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1064 set thread context of 1320 1064 SOA.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 RegSvcs.ExE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1320 RegSvcs.ExE 1320 RegSvcs.ExE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run SOA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\ProPlayer = "C:\\Users\\Admin\\AppData\\Roaming\\ProPlayer\\Player.exe.exe" SOA.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1064 SOA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1320
-