Analysis
-
max time kernel
97s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
sososos.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sososos.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
sososos.exe
-
Size
1.1MB
-
MD5
4274297082755d98b9d07fad46dd9f33
-
SHA1
28a1a56d03bba60df0da5151c854759b477c40ad
-
SHA256
6cf454ec0892e0367356ae674e93612f1c23d9c99874d8ff7de7d77055cbf9c6
-
SHA512
f227836df848cfcf5da9de949a5f9986ddecd843a5484b9eab868d57357248541dc9307e9e4c057d0a2fd85166a1026a45f4e31b7ffbdaa6cc9aa84a9387d26a
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
notepad.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sososososos.vbs notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
sososos.exedescription pid process target process PID 3216 set thread context of 4704 3216 sososos.exe sososos.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
sososos.exesososos.exepowershell.exepid process 3216 sososos.exe 3216 sososos.exe 4704 sososos.exe 4704 sososos.exe 316 powershell.exe 316 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
sososos.exepid process 3216 sososos.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sososos.exepowershell.exedescription pid process Token: SeDebugPrivilege 4704 sososos.exe Token: SeDebugPrivilege 316 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
sososos.exesososos.execmd.exedescription pid process target process PID 3216 wrote to memory of 2440 3216 sososos.exe notepad.exe PID 3216 wrote to memory of 2440 3216 sososos.exe notepad.exe PID 3216 wrote to memory of 2440 3216 sososos.exe notepad.exe PID 3216 wrote to memory of 2440 3216 sososos.exe notepad.exe PID 3216 wrote to memory of 2440 3216 sososos.exe notepad.exe PID 3216 wrote to memory of 4704 3216 sososos.exe sososos.exe PID 3216 wrote to memory of 4704 3216 sososos.exe sososos.exe PID 3216 wrote to memory of 4704 3216 sososos.exe sososos.exe PID 4704 wrote to memory of 1688 4704 sososos.exe cmd.exe PID 4704 wrote to memory of 1688 4704 sososos.exe cmd.exe PID 4704 wrote to memory of 1688 4704 sososos.exe cmd.exe PID 1688 wrote to memory of 316 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 316 1688 cmd.exe powershell.exe PID 1688 wrote to memory of 316 1688 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sososos.exe"C:\Users\Admin\AppData\Local\Temp\sososos.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"2⤵
- Drops startup file
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\sososos.exe"C:\Users\Admin\AppData\Local\Temp\sososos.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\sososos.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\sososos.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316