Analysis

  • max time kernel
    112s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    18-07-2020 11:54

General

  • Target

    SecuriteInfo.com.Trojan.Siggen9.59975.9415.12682.exe

  • Size

    591KB

  • MD5

    e5383f9ff78e1af6c83f00f618d027c5

  • SHA1

    e247e980e8fc129025a2e64ad72b4bc163284cca

  • SHA256

    02877c1523986e1fbb50da0a828df2da4aca704d7de19b11c9225e5befbb0572

  • SHA512

    5f2ef98f940f607c04903b3675b662341565a3b0e6805e28b54d5da49bd3a3aac56c7256ee7155523e8943ee45c3f40f4beade3b0306e61295e7fb0106900a47

Score
10/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Contains code to disable Windows Defender 3 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.59975.9415.12682.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.59975.9415.12682.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.59975.9415.12682.exe
      "{path}"
      2⤵
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1440-2-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1440-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1440-5-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB