Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
08-10-2020 13:24
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe
-
Size
932KB
-
MD5
ff05aef9ab76c8f7c5983a2ce3d4e02d
-
SHA1
953459a3a1e598c1d7c28f5a2e52b7c982bc904b
-
SHA256
5183105aacaf926e7358ff33a1503e58d712a9fc97800bbe8e26132284acb414
-
SHA512
b9749ae87e74ac1f591e1fb2eca66dba4f7ee2836424de28c92fd9bed5a85408b1ea7c483e4793c4f50d823ba1dd6ddd60e321d201f31c3388c411aec65903b2
Malware Config
Extracted
Family
xpertrat
Version
3.0.10
Botnet
xbox
C2
91.193.75.200:4726
79.134.225.97:4726
Mutex
P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6
Signatures
-
XpertRAT Core Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3268-49-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat behavioral2/memory/3268-50-0x0000000000401364-mapping.dmp xpertrat behavioral2/memory/3268-51-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6.exe" iexplore.exe -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 3992 notepad.exe -
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exeSecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Windows\CurrentVersion\Run\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6 = "C:\\Users\\Admin\\AppData\\Roaming\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6\\P4U8N5X3-N0E7-P7T5-M113-K7R6K4S0G6G6.exe" iexplore.exe -
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exeSecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exedescription pid process target process PID 3056 set thread context of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3756 set thread context of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exepowershell.exeSecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exepid process 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 2136 powershell.exe 2136 powershell.exe 2136 powershell.exe 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exepowershell.exeiexplore.exedescription pid process Token: SeDebugPrivilege 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeDebugPrivilege 3268 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exeiexplore.exepid process 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe 3268 iexplore.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exeSecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exeiexplore.exedescription pid process target process PID 3056 wrote to memory of 2136 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe powershell.exe PID 3056 wrote to memory of 2136 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe powershell.exe PID 3056 wrote to memory of 2136 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe powershell.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3056 wrote to memory of 3756 3056 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3756 wrote to memory of 3268 3756 SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe iexplore.exe PID 3268 wrote to memory of 3992 3268 iexplore.exe notepad.exe PID 3268 wrote to memory of 3992 3268 iexplore.exe notepad.exe PID 3268 wrote to memory of 3992 3268 iexplore.exe notepad.exe PID 3268 wrote to memory of 3992 3268 iexplore.exe notepad.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe"1⤵
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe"2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3756 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.31344.29315.6962.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Deletes itself
PID:3992