Analysis

  • max time kernel
    123s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2022 13:32

General

  • Target

    SOA.exe

  • Size

    1.9MB

  • MD5

    081ccbaad04fe1298a6cd6b04c63fd14

  • SHA1

    87a31f4f90543f69f37fdcf7d0a4d8d5ca99de08

  • SHA256

    888101d59c219dc57cf3bec1dec7f3880bfb2e6d966da604eb2485741d72f889

  • SHA512

    e66b75dd580a3c60b418477e5e960b3893b12882981d4df71515262e0ea5c3062230d9d597c0b866c241a670961d124b5fa5f9052e20514b22642bcb9a7688b3

Malware Config

Signatures

  • Detect Neshta payload 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SOA.exe
    "C:\Users\Admin\AppData\Local\Temp\SOA.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANgA=
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:756
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      2⤵
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      PID:640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\ZIFIEQ~1\Rdxymb.exe

    Filesize

    1.9MB

    MD5

    f04716ca599d60c1b8bb293f8c2d097b

    SHA1

    e574a29cc8e00a8c33697d524cc30a0a048b00bf

    SHA256

    5c6346c9d9690aa61cf08f380c880d1e9df46b1ae7f357c3bbd9e057b02feaed

    SHA512

    9797f58318d3af58af83e15c01f7215afac800607c24926f5956f526724105166b930fb35c2aff4923cb970ad87f4085b2c70d4f1efd5155ac2729af73b663a4

  • memory/640-142-0x0000000000000000-mapping.dmp

  • memory/640-148-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-146-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-145-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-144-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/640-143-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/756-134-0x0000000004F40000-0x0000000005568000-memory.dmp

    Filesize

    6.2MB

  • memory/756-138-0x0000000007350000-0x00000000079CA000-memory.dmp

    Filesize

    6.5MB

  • memory/756-139-0x0000000006230000-0x000000000624A000-memory.dmp

    Filesize

    104KB

  • memory/756-137-0x0000000005D20000-0x0000000005D3E000-memory.dmp

    Filesize

    120KB

  • memory/756-136-0x00000000056E0000-0x0000000005746000-memory.dmp

    Filesize

    408KB

  • memory/756-135-0x0000000004E90000-0x0000000004EF6000-memory.dmp

    Filesize

    408KB

  • memory/756-133-0x0000000002780000-0x00000000027B6000-memory.dmp

    Filesize

    216KB

  • memory/756-132-0x0000000000000000-mapping.dmp

  • memory/4156-140-0x000000000DC20000-0x000000000DCB2000-memory.dmp

    Filesize

    584KB

  • memory/4156-141-0x000000000E270000-0x000000000E814000-memory.dmp

    Filesize

    5.6MB

  • memory/4156-130-0x0000000000660000-0x000000000084E000-memory.dmp

    Filesize

    1.9MB

  • memory/4156-131-0x0000000006250000-0x0000000006272000-memory.dmp

    Filesize

    136KB