Analysis
-
max time kernel
121s -
max time network
120s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
02-02-2024 15:53
Behavioral task
behavioral1
Sample
soan_2_2.zip
Resource
win10-20231215-en
General
-
Target
soan_2_2.zip
-
Size
17.7MB
-
MD5
8e93520d569a6e2afed2da31224c7568
-
SHA1
8b45cf1d65ffa2bf061222e2e35d0a3fb4739b87
-
SHA256
94c0a9f4adcb87a5705f7ad0776b27ee6471131f21fadad162de21590669f649
-
SHA512
a5e250e2ce0f121de7f5a89ced3a2fd0ddd69d47346c6020351bf9ee13d9522b81e86d08704392ea061fec879d92a785233218365b9db5a97f03a3daa67dccad
-
SSDEEP
393216:+oecXb9QxDfm4ZXDqgQG/yMWIsbfq4702k6sncVsLGBAYOD6C:+oe0b9QxDfBdDqgFyrIeP70t6snPbDDZ
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4168 WINWORD.EXE 4168 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3360 taskmgr.exe Token: SeSystemProfilePrivilege 3360 taskmgr.exe Token: SeCreateGlobalPrivilege 3360 taskmgr.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe 3360 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE 4168 WINWORD.EXE
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\soan_2_2.zip1⤵PID:812
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4064
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Files.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4168
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵PID:3700
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD50089a450ac0d5daa3adf503ff0a4729a
SHA1d0878bd92572f94d86b116f9bf0b14fe8732ebdb
SHA256475bc454dd4fe83f3039ff97e98878dcb591ce8605b4d4c171775ed6bd392850
SHA512458edb0f29f7e7d92dfb46981a59d8ff3a9c47ab2f09077000ef03ad063ebb94361adfddeb1e5dbc3857e6c639559bf1a14968ac905fd1d3756bfb786fd362b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5fe7ed669299eca7fa5e2eba80ac5d86d
SHA1335efbd0aa19b903fdeefbc69a0fbbaa6d826e13
SHA256fd0387dca4f9285743419668d9dfb022434e9a60d0c76e8f5f371e9fae172a03
SHA512ca91eb809a4020fc4afa2975e8261e46fda7d933f7138dd08f0fccb0142ce92728f1dcb488217e7748249a3100f567a60091e0dd13b33ee15c6a2b04f0e936c6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5dbed2591fcba0dd10beca34c013948c4
SHA15b7e6a821318265f5e29f5f5cba78faa60e0bc51
SHA256275fa4414fd3f9e0b60406ed021c4cba9c0a7d3b04bdd9f6556b42d4fff8f831
SHA51201d0a45567ee4f127456fb65c25c179f085115221f928aa257e0e8562731b97b2b641b3849cdbac43cb776b6c2b34bcfd547658479ac236a02aa3aa8c3c9443f