Analysis

  • max time kernel
    146s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-en-20210916
  • submitted
    20-09-2021 11:04

General

  • Target

    SOA.exe

  • Size

    1.3MB

  • MD5

    01b0dffa7c000f4d55544eb38f8ab238

  • SHA1

    cfa6ae5441f0c41d5d92e0fab0eb90b44e0d621e

  • SHA256

    f1540e89eeb7046cd265d37ef63a6d282a1ff8a89875193ae775582e74205594

  • SHA512

    d55c5d8e942d5dfe74a4ece63b707fa2a6f5d8551ed268d08eab9258ab9d91371d13a2dd447eb860b71bcbb125d5a1948b61bf40a2b7321dde7d6d2ce83cb526

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SOA.exe
    "C:\Users\Admin\AppData\Local\Temp\SOA.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\SOA.exe
      "{path}"
      2⤵
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\SOA.exe
        "{path}"
        2⤵
          PID:1096
        • C:\Users\Admin\AppData\Local\Temp\SOA.exe
          "{path}"
          2⤵
            PID:1480
          • C:\Users\Admin\AppData\Local\Temp\SOA.exe
            "{path}"
            2⤵
              PID:636
            • C:\Users\Admin\AppData\Local\Temp\SOA.exe
              "{path}"
              2⤵
                PID:1028

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/376-54-0x0000000000370000-0x0000000000371000-memory.dmp
              Filesize

              4KB

            • memory/376-56-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
              Filesize

              4KB

            • memory/376-58-0x0000000004BF2000-0x0000000004BF3000-memory.dmp
              Filesize

              4KB

            • memory/376-59-0x0000000004BF7000-0x0000000004C08000-memory.dmp
              Filesize

              68KB

            • memory/376-57-0x0000000004BF1000-0x0000000004BF2000-memory.dmp
              Filesize

              4KB

            • memory/376-60-0x00000000005B0000-0x00000000005BE000-memory.dmp
              Filesize

              56KB

            • memory/376-61-0x000000007EF40000-0x000000007EF41000-memory.dmp
              Filesize

              4KB

            • memory/376-62-0x0000000005E00000-0x0000000005E7B000-memory.dmp
              Filesize

              492KB

            • memory/376-63-0x0000000004300000-0x000000000432B000-memory.dmp
              Filesize

              172KB