Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
14-07-2020 22:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
Resource
win10v200430
General
-
Target
SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe
-
Size
178KB
-
MD5
9bd3bbc082d0b3446fd456d750a8bbbe
-
SHA1
d50d739d91ff82ad31a6227ba734b6658f1a577a
-
SHA256
63913936a820bf5e79bccb7ac74b80f78fae9aec0f2dbfa097f057227a2e4aa2
-
SHA512
c0ba3a8a7a305dfc2539ef0ead8e418795532eb39a70571296e06d5b27c2cdd9425165dd88afbb90511c2bb68be5bd587c5233743a395d0b3dfe76d90a42bb7b
Malware Config
Extracted
buer
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\02c1df6065ba3f800c3c\\gennt.exe\"" gennt.exe -
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1616-0-0x0000000000C70000-0x0000000000C7C000-memory.dmp buer behavioral2/memory/2824-4-0x0000000000EA0000-0x0000000000EAC000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 2824 gennt.exe -
Deletes itself 1 IoCs
pid Process 2824 gennt.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\K: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\X: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\W: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 gennt.exe 2824 gennt.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2824 1616 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 73 PID 1616 wrote to memory of 2824 1616 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 73 PID 1616 wrote to memory of 2824 1616 SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe 73 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 4044 2824 gennt.exe 75 PID 2824 wrote to memory of 3884 2824 gennt.exe 76 PID 2824 wrote to memory of 3884 2824 gennt.exe 76 PID 2824 wrote to memory of 3884 2824 gennt.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\ProgramData\02c1df6065ba3f800c3c\gennt.exeC:\ProgramData\02c1df6065ba3f800c3c\gennt.exe "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3218.21083.22208.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\02c1df6065ba3f800c3c\gennt.exe3⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\02c1df6065ba3f800c3c}"3⤵PID:3884
-
-