Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-01-2023 10:26
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20220812-en
General
-
Target
SOA.exe
-
Size
671KB
-
MD5
774dc51d4da8bbc4e682008bf4d61aa2
-
SHA1
0a12ab2bed3ce4e701e534df5c24bfef8dcc653b
-
SHA256
b03d831a555a8366ac262fa9d13fde89b675803d41c57d36f07090a0cedab154
-
SHA512
38bfce718ca25bba53e5ceb3de3c6b7c643bfdd358094ab8d0ec288415391146e029d778a43afe3edb86e4bf8d7fde2a65e3f553ee2467437f6b3de1eb3b2306
-
SSDEEP
12288:UF3gflcMVpRY6HxOVU9z+EHE1tKuSoNvXOTwYM0:z6MVpcUptU9A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
SOA.exepid process 2000 SOA.exe 2000 SOA.exe 2000 SOA.exe 2000 SOA.exe 2000 SOA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SOA.exedescription pid process Token: SeDebugPrivilege 2000 SOA.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
SOA.exedescription pid process target process PID 2000 wrote to memory of 652 2000 SOA.exe schtasks.exe PID 2000 wrote to memory of 652 2000 SOA.exe schtasks.exe PID 2000 wrote to memory of 652 2000 SOA.exe schtasks.exe PID 2000 wrote to memory of 652 2000 SOA.exe schtasks.exe PID 2000 wrote to memory of 568 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 568 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 568 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 568 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1856 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1856 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1856 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1856 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 772 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 772 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 772 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 772 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1168 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1168 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1168 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1168 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1304 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1304 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1304 2000 SOA.exe SOA.exe PID 2000 wrote to memory of 1304 2000 SOA.exe SOA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BWhappphtUdy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7678.tmp"Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"{path}"
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
System Information Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Scheduled Task
1Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp7678.tmpFilesize
1KB
MD5ceb10c7b07a45aa14abb778dc5a9a86b
SHA18a9a0a47e22b48411fcb97d5c62bba8436254ad0
SHA256e961b768dc4cf857377b0f216e65466fb31ad4215d9e0b35d2687f478e8dd247
SHA512effe05eaaa35a32b378a29222ec910a234668dda5eb73b9571e3b3f4d4b812c13945b0a7dd53b9480502ae8a6d0c04f99bd4cd4a5fff969f2025fd46557d1001
-
memory/652-60-0x0000000000000000-mapping.dmp
-
memory/2000-54-0x00000000012D0000-0x000000000137E000-memory.dmpFilesize
696KB
-
memory/2000-55-0x0000000075D11000-0x0000000075D13000-memory.dmpFilesize
8KB
-
memory/2000-56-0x00000000003A0000-0x00000000003AE000-memory.dmpFilesize
56KB
-
memory/2000-57-0x0000000004860000-0x00000000048C8000-memory.dmpFilesize
416KB
-
memory/2000-58-0x0000000005280000-0x00000000052EA000-memory.dmpFilesize
424KB
-
memory/2000-59-0x0000000000700000-0x0000000000714000-memory.dmpFilesize
80KB