Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:08
Behavioral task
behavioral1
Sample
AUG 2024 SOA.exe
Resource
win7-20240903-en
General
-
Target
AUG 2024 SOA.exe
-
Size
712KB
-
MD5
c798a0526218a02b39a5789aac0f8802
-
SHA1
d23e9b5eb48d192a8494b225472478d820e7083d
-
SHA256
3fe4c784dfb841053360622561788dacfc8e4b81567bc461e4cd33e61d2d1e64
-
SHA512
beae93075c02917b483523e240727b91c640e4e23291b61cd11d1cb283762ab90784f09a53a1e842facba064f7ef60cf9eeb01085f8156e6963169c747805d52
-
SSDEEP
12288:sYV6MorX7qzuC3QHO9FQVHPF51jgc6B+gwiK3fw3uZhWOkVdRcTkXfmCspC1YHdm:LBXu9HGaVHaJK3I3uZoHuTofJr1Y/YGW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3524-0-0x00000000009D0000-0x0000000000B61000-memory.dmp upx behavioral2/memory/3524-17-0x00000000009D0000-0x0000000000B61000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3524-17-0x00000000009D0000-0x0000000000B61000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3524 set thread context of 2788 3524 AUG 2024 SOA.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUG 2024 SOA.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe 2788 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3524 AUG 2024 SOA.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3524 AUG 2024 SOA.exe 3524 AUG 2024 SOA.exe 3524 AUG 2024 SOA.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3524 AUG 2024 SOA.exe 3524 AUG 2024 SOA.exe 3524 AUG 2024 SOA.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2788 3524 AUG 2024 SOA.exe 86 PID 3524 wrote to memory of 2788 3524 AUG 2024 SOA.exe 86 PID 3524 wrote to memory of 2788 3524 AUG 2024 SOA.exe 86 PID 3524 wrote to memory of 2788 3524 AUG 2024 SOA.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\AUG 2024 SOA.exe"C:\Users\Admin\AppData\Local\Temp\AUG 2024 SOA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\AUG 2024 SOA.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD56500661d6ab7b0ecff610cb921978787
SHA15b535800bd57414ce874869a753868c39f03c47e
SHA2564d2de2720fe899cd1ba7435d957f4889187731bf5507b184c47049af0dab58de
SHA5122cc1de5d0b1730823362b683df35f2bf38e7b7894166c020b9c7072745698be5d507f89ef2b17ccabfbce4005aeb7718e5af5d882b61a2da383152ea1b52fb08