Analysis
-
max time kernel
85s -
max time network
109s -
platform
windows10_x64 -
resource
win10 -
submitted
17-07-2020 16:24
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SOA.exe
-
Size
682KB
-
MD5
ec2b532d9dbebba1ffcd72a8206b6d0f
-
SHA1
dda450e2d612fe24e3578e6c1b1d7e058cb94d6f
-
SHA256
42c563ce8d199292f5643e1728f6cd15c4419eb957b408f37ff066564774c50c
-
SHA512
d762a92268bb7577f884449c5016b51086108b965b485ac3dc18d6ffb0c08543b8a72a3e63600b00ef083c1433c064839454f75edab78f16be4b0e590e181476
Score
10/10
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
bigboy5570@@@@
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3936 RegSvcs.ExE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3936 RegSvcs.ExE 3936 RegSvcs.ExE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run SOA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\ProPlayer = "C:\\Users\\Admin\\AppData\\Roaming\\ProPlayer\\Player.exe.exe" SOA.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 SOA.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 PID 2728 wrote to memory of 3936 2728 SOA.exe 67 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 3936 2728 SOA.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:2728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.ExE"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3936
-