Analysis
-
max time kernel
114s -
max time network
158s -
platform
windows7_x64 -
resource
win7 -
submitted
02-08-2020 04:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe
Resource
win7
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe
Resource
win10v200722
General
-
Target
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe
-
Size
824KB
-
MD5
061c34015e1bf2e8443e5d6d6678705a
-
SHA1
fafcdd793afab2ac017342cf5e587b45bc676e0b
-
SHA256
27d52d4881c4ef9f8f6dea631a6a635ac7e005a8f5170198dd84fca21d79abc9
-
SHA512
d74d3bd7e5db812fc44446e8a33c2b736e37cf2b0a61bdf712bf0fb4c7c2b6b3e33f83b938046ad215309c1fcbb41ceae9f6c14c86c5208b180164dcdeaf42d7
Malware Config
Extracted
C:\Users\Admin\AppData\Local\E2C1E8F1FA\Log.txt
masslogger
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exeSecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exedescription pid process Token: SeDebugPrivilege 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe Token: SeDebugPrivilege 1708 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exeSecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exepid process 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe 1708 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe 1708 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exepid process 1708 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe -
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exedescription pid process target process PID 1612 wrote to memory of 1508 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1508 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1508 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1508 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe PID 1612 wrote to memory of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exepid process 1708 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe -
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exedescription pid process target process PID 1612 set thread context of 1708 1612 SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.60237.32635.28326.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1612-1-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/1708-2-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/1708-3-0x000000000049442E-mapping.dmp
-
memory/1708-4-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB
-
memory/1708-5-0x0000000000400000-0x000000000049A000-memory.dmpFilesize
616KB