Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20210916
  • submitted
    20-09-2021 12:12

General

  • Target

    SOA.exe

  • Size

    1.3MB

  • MD5

    01b0dffa7c000f4d55544eb38f8ab238

  • SHA1

    cfa6ae5441f0c41d5d92e0fab0eb90b44e0d621e

  • SHA256

    f1540e89eeb7046cd265d37ef63a6d282a1ff8a89875193ae775582e74205594

  • SHA512

    d55c5d8e942d5dfe74a4ece63b707fa2a6f5d8551ed268d08eab9258ab9d91371d13a2dd447eb860b71bcbb125d5a1948b61bf40a2b7321dde7d6d2ce83cb526

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SOA.exe
    "C:\Users\Admin\AppData\Local\Temp\SOA.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Users\Admin\AppData\Local\Temp\SOA.exe
      "{path}"
      2⤵
        PID:2008
      • C:\Users\Admin\AppData\Local\Temp\SOA.exe
        "{path}"
        2⤵
          PID:1688
        • C:\Users\Admin\AppData\Local\Temp\SOA.exe
          "{path}"
          2⤵
            PID:912
          • C:\Users\Admin\AppData\Local\Temp\SOA.exe
            "{path}"
            2⤵
              PID:980
            • C:\Users\Admin\AppData\Local\Temp\SOA.exe
              "{path}"
              2⤵
                PID:1332

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2012-54-0x0000000000330000-0x0000000000331000-memory.dmp
              Filesize

              4KB

            • memory/2012-56-0x0000000004540000-0x0000000004541000-memory.dmp
              Filesize

              4KB

            • memory/2012-59-0x0000000004547000-0x0000000004558000-memory.dmp
              Filesize

              68KB

            • memory/2012-58-0x0000000004542000-0x0000000004543000-memory.dmp
              Filesize

              4KB

            • memory/2012-57-0x0000000004541000-0x0000000004542000-memory.dmp
              Filesize

              4KB

            • memory/2012-60-0x00000000007A0000-0x00000000007AE000-memory.dmp
              Filesize

              56KB

            • memory/2012-61-0x000000007EF40000-0x000000007EF41000-memory.dmp
              Filesize

              4KB

            • memory/2012-62-0x0000000007E90000-0x0000000007F0B000-memory.dmp
              Filesize

              492KB

            • memory/2012-63-0x0000000004350000-0x000000000437B000-memory.dmp
              Filesize

              172KB