Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    14-09-2021 16:10

General

  • Target

    SplashtopSOS.exe

  • Size

    7.9MB

  • MD5

    89d8445240fd9d438583429458d76756

  • SHA1

    c7f83b6f86002b6d92c20019dcf11d8fc7690259

  • SHA256

    e7677cc256fd579f656584413a3c227d7063b5791b333ffef200610a3adee6a3

  • SHA512

    ad5859344694a5d51eecbdc2b2e8fc52596cf738a7d677a53caf7b76d3db6c20d72e7647c44fa952cb98b7c527df332110be79167db9ea87b5a79f818c8b05d6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 9 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SplashtopSOS.exe
    "C:\Users\Admin\AppData\Local\Temp\SplashtopSOS.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c expand *.cab /f:* .\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Windows\system32\expand.exe
        expand *.cab /f:* .\
        3⤵
        • Drops file in Windows directory
        PID:3944
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c schtasks /create /xml ASOS.xml /ru "system" /tn ASOS1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\system32\schtasks.exe
        schtasks /create /xml ASOS.xml /ru "system" /tn ASOS1
        3⤵
        • Creates scheduled task(s)
        PID:3936
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c schtasks /change /tn ASOS1 /ru "system" /tr "'C:\Users\Admin\AppData\Local\Temp\unpacksos\1\\Launcher.exe' SRManagerSOS.exe 1 "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3156
      • C:\Windows\system32\schtasks.exe
        schtasks /change /tn ASOS1 /ru "system" /tr "'C:\Users\Admin\AppData\Local\Temp\unpacksos\1\\Launcher.exe' SRManagerSOS.exe 1 "
        3⤵
          PID:3852
      • C:\Windows\System32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c schtasks /run /tn ASOS1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Windows\system32\schtasks.exe
          schtasks /run /tn ASOS1
          3⤵
            PID:788
        • C:\Windows\System32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c schtasks /delete /f /tn ASOS1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /f /tn ASOS1
            3⤵
              PID:2892
        • C:\Users\Admin\AppData\Local\Temp\unpacksos\1\Launcher.exe
          C:\Users\Admin\AppData\Local\Temp\unpacksos\1\\Launcher.exe SRManagerSOS.exe 1
          1⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3544
          • C:\Users\Admin\AppData\Local\Temp\unpacksos\1\SRManagerSOS.exe
            "SRManagerSOS.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3864
            • C:\Users\Admin\AppData\Local\Temp\unpacksos\1\SRServerSOS.exe
              SRServerSOS.exe -s
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2180
            • C:\Users\Admin\AppData\Local\Temp\unpacksos\1\SRFeatureSOS.exe
              "C:\Users\Admin\AppData\Local\Temp\unpacksos\1\SRFeatureSOS.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:4024
              • C:\Users\Admin\AppData\Local\Temp\unpacksos\1\SRUtilitySOS.exe
                SRUtilitySOS.exe -r
                4⤵
                • Executes dropped EXE
                PID:1664

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads