Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 22:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
Resource
win10v200430
General
-
Target
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
-
Size
178KB
-
MD5
9bd3bbc082d0b3446fd456d750a8bbbe
-
SHA1
d50d739d91ff82ad31a6227ba734b6658f1a577a
-
SHA256
63913936a820bf5e79bccb7ac74b80f78fae9aec0f2dbfa097f057227a2e4aa2
-
SHA512
c0ba3a8a7a305dfc2539ef0ead8e418795532eb39a70571296e06d5b27c2cdd9425165dd88afbb90511c2bb68be5bd587c5233743a395d0b3dfe76d90a42bb7b
Malware Config
Extracted
buer
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\a4bfe5892a83f38eafd7\\gennt.exe\"" gennt.exe -
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1044-0-0x0000000000120000-0x000000000012C000-memory.dmp buer behavioral1/memory/1296-4-0x0000000000260000-0x000000000026C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1296 gennt.exe -
Deletes itself 1 IoCs
pid Process 1296 gennt.exe -
Loads dropped DLL 1 IoCs
pid Process 1044 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\K: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1296 gennt.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1296 1044 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 25 PID 1044 wrote to memory of 1296 1044 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 25 PID 1044 wrote to memory of 1296 1044 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 25 PID 1044 wrote to memory of 1296 1044 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 25 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1508 1296 gennt.exe 27 PID 1296 wrote to memory of 1780 1296 gennt.exe 30 PID 1296 wrote to memory of 1780 1296 gennt.exe 30 PID 1296 wrote to memory of 1780 1296 gennt.exe 30 PID 1296 wrote to memory of 1780 1296 gennt.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\ProgramData\a4bfe5892a83f38eafd7\gennt.exeC:\ProgramData\a4bfe5892a83f38eafd7\gennt.exe "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\a4bfe5892a83f38eafd7\gennt.exe3⤵PID:1508
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\a4bfe5892a83f38eafd7}"3⤵PID:1780
-
-