Analysis
-
max time kernel
272s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2022 08:18
Static task
static1
Behavioral task
behavioral1
Sample
Outstanding SOA.exe
Resource
win7-20221111-en
General
-
Target
Outstanding SOA.exe
-
Size
601KB
-
MD5
5b18fe7d9aa3fdcdec0d0932827f7b05
-
SHA1
104e5d48286576742b08a760d208ce13ad141594
-
SHA256
0f271e19f44c1a2535e2010c6c9d25cacfba120bd75fab85e01feebe961dd4c7
-
SHA512
871820be64509b04dd7fd35d7e44204050801a9157836fc9ddfaedf83a1aa6d583bd0541753caa9b78e6b2c425e2e7487e5e223d5bcdcbb95d5b7bca0186db53
-
SSDEEP
12288:1Z+9tvUmtBrASq86QaJZ76qIJgNhU3aHHI1S8WDcKEBkKmYu8gWd78rrYk3S:b+vvLo86QMZ7QQuoT8WYu8Rd78r8
Malware Config
Extracted
formbook
scse
SKpYFyVNT2zunKf0uuM=
FlEHUseI7I5XbrO8fR/XBcS9ZA==
FPuxoUOxkLiATugw
VKdxsDSk0jdT5Kw=
FpqHf9iI/1tl97E=
YGI6sIl3UIxfZvlD+JiUuuLR
oBAEO0suBEAD5aK00A==
RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==
VFg9s3W0/Ype8A3cZb+D7g==
hwD+VNd6014nrsaTWm4FBcS9ZA==
zkAdUq1soKYUfZaTqLmL
XVQ9WbRivUIQ477a/hKv+g==
QireF2geizAwmp674AGc5g==
PSTUQxs6j8OATugw
LHJhyy2VbX8NEqf0uuM=
MiY1vg6T3HqATugw
wqkUjaVXnGgBqA==
jUr/eUtSIT01Wegt
PjQidcqKzAbSZICUZb+D7g==
OkAmcv12sUEAIHwFHakzdIo2FPHw
zyDLsw+3I3H6gnaGZb+D7g==
ll0HRs5IJGxCZMJPahHgOt2RqjU=
YqaIEokHuw6V
jGJG11YCObJ+IQIXCW8KU+ZcbA==
jv4ITr8zITdT5Kw=
nXYro3yHe5YV5aK00A==
rJt1IPkxeQDUayhVCJyUuuLR
oFwz1DUU/RdD5aK00A==
FHlVTKEVIRFE5aK00A==
8GhjL2lJOWD+5aK00A==
k3BLouunGsagwhAi6oeUuuLR
p45GiQN5bZMjR9karDwDa442FPHw
Zdd7rVCKu/b3TIVU6t/lP92RqjU=
wyjxGjYHuw6V
nW5RrwV6yTdT5Kw=
itzGDGclWW4SqnLBSWH5Pt2RqjU=
8zwgceJYRWn+DKf0uuM=
EmojFmj027tsHrs=
ExQEPY5UyyS00HPvNNCH8w==
laiGCZRTkbg/XAl/Zb+D7g==
wYQysWBl+DdT5Kw=
MWo3rYV3XoAJ5aK00A==
hnht0SrcDR+XpjV6H6WUuuLR
rxqw6S7qG8A=
aEcfph/RAUAcfZYnXOw=
EXdVkuuzJ8eEjkTROs2D
MDYsc8l6w0wM7ZOiyQ==
Rw3XPwT+8UID5aK00A==
zDPp+Pskft/5iqS+0Q==
Z8h8hYCm/ULHXQ+YY2kJBcS9ZA==
vTDkm31vabx5EfoFMjLsVpBlz+fQfg==
+EcrRpZyp7tFba65dhvXBcS9ZA==
rHVJpwl6dLSATugw
gUoTghFSoTMpiXyQe9N3uOjQ
47Zwn/CkFQCty07ROs2D
NYkP+jcHuw6V
nfvdFnkHuw6V
L4piRRhAmfwGKITjemhRkmQ=
s6Jdx36Q+t5U7LE=
58iYH6dVmzYCnHZ/Zb+D7g==
IQ/WHZJWuVUD5aK00A==
Cf6t72PUxhnicjvBiFxqP0o2FPHw
DQr7l4R4rlEJ5aK00A==
62gezKeQv8mIIBbcZb+D7g==
kmuregister.com
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
rnpjg.exernpjg.exepid process 2952 rnpjg.exe 4948 rnpjg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rnpjg.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation rnpjg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rnpjg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fraqedsp = "C:\\Users\\Admin\\AppData\\Roaming\\ijgmkirxgg\\gtbkyhm.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\rnpjg.exe\" \"C:\\Users\\Admin\\AppData\\Local\\" rnpjg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
rnpjg.exernpjg.execscript.exedescription pid process target process PID 2952 set thread context of 4948 2952 rnpjg.exe rnpjg.exe PID 4948 set thread context of 2468 4948 rnpjg.exe Explorer.EXE PID 4948 set thread context of 2468 4948 rnpjg.exe Explorer.EXE PID 1320 set thread context of 2468 1320 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 1956 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
rnpjg.execscript.exepid process 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 1320 cscript.exe 1320 cscript.exe 1320 cscript.exe 1320 cscript.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
rnpjg.exernpjg.execscript.exepid process 2952 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 4948 rnpjg.exe 1320 cscript.exe 1320 cscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
rnpjg.exeExplorer.EXEcscript.exedescription pid process Token: SeDebugPrivilege 4948 rnpjg.exe Token: SeShutdownPrivilege 2468 Explorer.EXE Token: SeCreatePagefilePrivilege 2468 Explorer.EXE Token: SeDebugPrivilege 1320 cscript.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
rnpjg.exepid process 2952 rnpjg.exe 2952 rnpjg.exe 2952 rnpjg.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
rnpjg.exepid process 2952 rnpjg.exe 2952 rnpjg.exe 2952 rnpjg.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Outstanding SOA.exernpjg.exeExplorer.EXErnpjg.exedescription pid process target process PID 4380 wrote to memory of 2952 4380 Outstanding SOA.exe rnpjg.exe PID 4380 wrote to memory of 2952 4380 Outstanding SOA.exe rnpjg.exe PID 4380 wrote to memory of 2952 4380 Outstanding SOA.exe rnpjg.exe PID 2952 wrote to memory of 4948 2952 rnpjg.exe rnpjg.exe PID 2952 wrote to memory of 4948 2952 rnpjg.exe rnpjg.exe PID 2952 wrote to memory of 4948 2952 rnpjg.exe rnpjg.exe PID 2952 wrote to memory of 4948 2952 rnpjg.exe rnpjg.exe PID 2468 wrote to memory of 1276 2468 Explorer.EXE mstsc.exe PID 2468 wrote to memory of 1276 2468 Explorer.EXE mstsc.exe PID 2468 wrote to memory of 1276 2468 Explorer.EXE mstsc.exe PID 2468 wrote to memory of 1956 2468 Explorer.EXE NETSTAT.EXE PID 2468 wrote to memory of 1956 2468 Explorer.EXE NETSTAT.EXE PID 2468 wrote to memory of 1956 2468 Explorer.EXE NETSTAT.EXE PID 4948 wrote to memory of 1320 4948 rnpjg.exe cscript.exe PID 4948 wrote to memory of 1320 4948 rnpjg.exe cscript.exe PID 4948 wrote to memory of 1320 4948 rnpjg.exe cscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Outstanding SOA.exe"C:\Users\Admin\AppData\Local\Temp\Outstanding SOA.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rnpjg.exe"C:\Users\Admin\AppData\Local\Temp\rnpjg.exe" "C:\Users\Admin\AppData\Local\Temp\zmcinw.au3"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rnpjg.exe"C:\Users\Admin\AppData\Local\Temp\rnpjg.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Gathers network information
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\alctbc.kyqFilesize
184KB
MD573d4c92a0cb55a83cf0e4b08879c4080
SHA1ea27c6e1f86b6469dea6e0392af690c7ac332cd0
SHA256f6454a96452a2142a954b0e27a9ffffa9a3b7a15bfdfacfd7394bd4575897147
SHA5121233e3d6158fafdbc4dadc5f36081fbbbe5d6a794b3cee4bf9f1251518c0f088a27b44cd44cdb63a91d38041d8ebe85007b08e08311f9af61363f933126208af
-
C:\Users\Admin\AppData\Local\Temp\opkjlsm.temFilesize
71KB
MD5b009dc657334b7c5620e3f69b67c52d8
SHA12b627181e4604e43f0e5940685c906af2f934ebd
SHA256e27c476fe94f05e6071774ae78face8e7aa210017d82fc2b730ed9a4225190f4
SHA51261e21eb90d14e2c6dcdb5663bdad813dc3acba3d464ec6beca244e43d1201e6959e82f2b2d4d3ea33088a330b439f364a2bc1c8b9a34e931a30b0f133a633a27
-
C:\Users\Admin\AppData\Local\Temp\rnpjg.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\rnpjg.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\rnpjg.exeFilesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\zmcinw.au3Filesize
5KB
MD5117023ca6c9d048889527b2fa88b8389
SHA1ac25454c352cd8ca72dd78a998a83bacdc157669
SHA2567e4adc51d85f01a9f32511a94ac5e80489feb54039128697943c00cecf8d59ac
SHA512bc200140dd1552c55b7fa10f21715b4a881d8a331c073ba5368544c5efede85b1f1242b58eb31505415cb195203cdf7f3cd99de758af1717aed91e092c44e0a8
-
memory/1320-156-0x00000000005C0000-0x00000000005ED000-memory.dmpFilesize
180KB
-
memory/1320-155-0x0000000002870000-0x00000000028FF000-memory.dmpFilesize
572KB
-
memory/1320-154-0x0000000002960000-0x0000000002CAA000-memory.dmpFilesize
3.3MB
-
memory/1320-152-0x0000000000C20000-0x0000000000C47000-memory.dmpFilesize
156KB
-
memory/1320-153-0x00000000005C0000-0x00000000005ED000-memory.dmpFilesize
180KB
-
memory/1320-149-0x0000000000000000-mapping.dmp
-
memory/2468-157-0x0000000007E30000-0x0000000007F1B000-memory.dmpFilesize
940KB
-
memory/2468-148-0x0000000002910000-0x0000000002A2D000-memory.dmpFilesize
1.1MB
-
memory/2468-145-0x0000000007770000-0x000000000790D000-memory.dmpFilesize
1.6MB
-
memory/2952-132-0x0000000000000000-mapping.dmp
-
memory/4948-144-0x00000000009F0000-0x0000000000A00000-memory.dmpFilesize
64KB
-
memory/4948-147-0x0000000001600000-0x0000000001610000-memory.dmpFilesize
64KB
-
memory/4948-150-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4948-151-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/4948-146-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/4948-143-0x0000000000422000-0x0000000000424000-memory.dmpFilesize
8KB
-
memory/4948-142-0x0000000001640000-0x000000000198A000-memory.dmpFilesize
3.3MB
-
memory/4948-141-0x0000000000401000-0x000000000042E000-memory.dmpFilesize
180KB
-
memory/4948-140-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/4948-138-0x0000000000000000-mapping.dmp