Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2023 08:36
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20230703-en
General
-
Target
SOA.exe
-
Size
426KB
-
MD5
2d2d2d51c9dec0a7811ff8ffc4827689
-
SHA1
ebf524dbe0a9adec78fca81308574a26c7c466c6
-
SHA256
8a0c61f29aa2697e44a61977bc06c3cf4c2bd8228ebc0fa00ac057b7375ff2ed
-
SHA512
16b4ed1c5de39c8b12b54d759a4ba38cb75f5b72ae7c0508f8895ada7dc0207e2d2e27fb9bea1ed286ea8ca66e4fd49036a74db4c533187a99a67ec2e2717b9b
-
SSDEEP
12288:pYbyIfr4roCQxOCz0oPcujV0qtaGSTv8mY/L:pYbRf8r5zCz0oPcAO27SomYz
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 964 SOA.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\clhqm = "C:\\Users\\Admin\\AppData\\Roaming\\unjoxhdmvrbwf\\oktdyienws.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\SOA.exe\"" SOA.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 964 set thread context of 2488 964 SOA.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 SOA.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 964 SOA.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2488 SOA.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2488 964 SOA.exe 84 PID 964 wrote to memory of 2488 964 SOA.exe 84 PID 964 wrote to memory of 2488 964 SOA.exe 84 PID 964 wrote to memory of 2488 964 SOA.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5d039cba14a0f7cd0e74baf052c3fa236
SHA15b3e8d07191e642186a1543f38161efb2bd6e211
SHA256e0900b99e6cf0907b06e9f5a88ada6301f62ede0204bedbf210f936588f19c10
SHA512167d6b4e4e028f8c5aa7c1276f391bea691f6028e01b4c2da2532c02b3a3292c94d38d676c5cb36911c5bca70256e69e3670f0d089e4375620aba3891db03a26