Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    25-10-2020 22:56

General

  • Target

    SecuriteInfo.com.Trojan.Siggen10.14421.6375.30290.exe

  • Size

    75KB

  • MD5

    fcbb520e5c66b1f024440e4eea650686

  • SHA1

    710a7bd0d4791edc0f75d8d778c173c981120b5d

  • SHA256

    f2af7f2de72d42d045309ea26b6c19076a42b4e6703fb15b5d40416ab37a8052

  • SHA512

    0be757dd903f53394cfd46869e3694aa68f95efe1fcfba24649e9fdc33c489a4095fe0a22a5a50da4ae9cba35251790b0943365bf02fb52d7f6de3fa5173a733

Malware Config

Signatures

  • Phorphiex Payload 11 IoCs
  • Phorphiex Worm

    Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Windows security bypass 2 TTPs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 10 IoCs
  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.14421.6375.30290.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen10.14421.6375.30290.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\7237775230121\svchost.exe
      C:\7237775230121\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\1274413983.exe
        C:\Users\Admin\AppData\Local\Temp\1274413983.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\16542656621731\svchost.exe
          C:\16542656621731\svchost.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious use of WriteProcessMemory
          PID:744
          • C:\Users\Admin\AppData\Local\Temp\1480736834.exe
            C:\Users\Admin\AppData\Local\Temp\1480736834.exe
            5⤵
            • Executes dropped EXE
            PID:324
          • C:\Users\Admin\AppData\Local\Temp\1814013567.exe
            C:\Users\Admin\AppData\Local\Temp\1814013567.exe
            5⤵
            • Executes dropped EXE
            PID:1436
          • C:\Users\Admin\AppData\Local\Temp\3239631733.exe
            C:\Users\Admin\AppData\Local\Temp\3239631733.exe
            5⤵
            • Executes dropped EXE
            PID:824
          • C:\Users\Admin\AppData\Local\Temp\3091511092.exe
            C:\Users\Admin\AppData\Local\Temp\3091511092.exe
            5⤵
            • Executes dropped EXE
            PID:2172
      • C:\Users\Admin\AppData\Local\Temp\1725926510.exe
        C:\Users\Admin\AppData\Local\Temp\1725926510.exe
        3⤵
        • Executes dropped EXE
        PID:320
      • C:\Users\Admin\AppData\Local\Temp\1814910822.exe
        C:\Users\Admin\AppData\Local\Temp\1814910822.exe
        3⤵
        • Executes dropped EXE
        PID:652
      • C:\Users\Admin\AppData\Local\Temp\2751316021.exe
        C:\Users\Admin\AppData\Local\Temp\2751316021.exe
        3⤵
        • Executes dropped EXE
        PID:1936

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\16542656621731\svchost.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • C:\16542656621731\svchost.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • C:\7237775230121\svchost.exe
    MD5

    fcbb520e5c66b1f024440e4eea650686

    SHA1

    710a7bd0d4791edc0f75d8d778c173c981120b5d

    SHA256

    f2af7f2de72d42d045309ea26b6c19076a42b4e6703fb15b5d40416ab37a8052

    SHA512

    0be757dd903f53394cfd46869e3694aa68f95efe1fcfba24649e9fdc33c489a4095fe0a22a5a50da4ae9cba35251790b0943365bf02fb52d7f6de3fa5173a733

  • C:\7237775230121\svchost.exe
    MD5

    fcbb520e5c66b1f024440e4eea650686

    SHA1

    710a7bd0d4791edc0f75d8d778c173c981120b5d

    SHA256

    f2af7f2de72d42d045309ea26b6c19076a42b4e6703fb15b5d40416ab37a8052

    SHA512

    0be757dd903f53394cfd46869e3694aa68f95efe1fcfba24649e9fdc33c489a4095fe0a22a5a50da4ae9cba35251790b0943365bf02fb52d7f6de3fa5173a733

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0HLJMLYB\1[1]
    MD5

    bd8681538e4af5e2397ef9ec18a45d64

    SHA1

    56b5e62dcf8090c67519677e0c59a5a28bb8c525

    SHA256

    6ebb791c1925feb9b29ddb282d411114ca2156e153a028155e766614376a443e

    SHA512

    640904244c21d4b57708d45046c75812f4e211a65c5af2c2c4d264a7a72a0a435de627bd538934e7e1bfe16fff801fb7fa7f14d3db5a1a9e2f22a35fdc155b26

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0HLJMLYB\3[1]
    MD5

    324a703ec18e8649d5f578d9a67223fc

    SHA1

    bcbd27442bde2ba710bb992ad224d8a1ba910480

    SHA256

    b633e8e885133595d0db50b247210896b3ccf2e8dee3b5f10f96471329641ec4

    SHA512

    b2506dbb54db9324451b633aabff849b91f4674a2f06c22777a80276b59b1dd023bb886bd16ebe04b9f3ba2fd8a1cd79700697f0c59f7ab9ef79b5f740c17ecf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KS4IYJDQ\2[1]
    MD5

    e2824fff8e3879279626866e5197e680

    SHA1

    9df30cd6e894352b1a001d3178cca78057198f5a

    SHA256

    adef83ca9a41294170281ebf67b3bbe96f8e68246c01bbf3edc80a754ec48341

    SHA512

    f4849aa38e60919a0f5b8aeebd750f812e89bcff2bbadcd0d7e6f158c4572bbc0f7f8ce5ecb804adb0516ad73d7aec2d1d50217bb21b17a502ba7b641664bfe3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KS4IYJDQ\4[1]
    MD5

    c60c14a709009a2b11f0b08b47d0c360

    SHA1

    b955e646964a76229dc170a11c99e0f1a20e6fa5

    SHA256

    9604cbb3047d8eb09e29b7cbf1cb25f93c6c07a2899b7297cd9f9f1a46a47d5c

    SHA512

    22c94b793804149e704f9a5d607ccdaa706f6363bcf8d743ad78afcd6e37e912e429f62b1807ba23c272f101b1e24b10578cc9c8647237da86cf8ee136152f4c

  • C:\Users\Admin\AppData\Local\Temp\1274413983.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • C:\Users\Admin\AppData\Local\Temp\1274413983.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • C:\Users\Admin\AppData\Local\Temp\1480736834.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • C:\Users\Admin\AppData\Local\Temp\1725926510.exe
    MD5

    8c65b44e5d2d09d5c14e881a52386fd1

    SHA1

    848d6ec4d4b0ad4322bb9c4b33d4c03b6c39114d

    SHA256

    40f7fc587d70e0c3c1e8f955cec25fd86ada17928920b04714a2444289921992

    SHA512

    88ce9eb6d8d042cdff7e3413ba2e28ae0781f4e79f548e79da6a7775b35b860d5a7f71352294e07b559bab606b26d1ba77e747cc6b0cef75234e29d3afde424f

  • C:\Users\Admin\AppData\Local\Temp\1814013567.exe
    MD5

    8c65b44e5d2d09d5c14e881a52386fd1

    SHA1

    848d6ec4d4b0ad4322bb9c4b33d4c03b6c39114d

    SHA256

    40f7fc587d70e0c3c1e8f955cec25fd86ada17928920b04714a2444289921992

    SHA512

    88ce9eb6d8d042cdff7e3413ba2e28ae0781f4e79f548e79da6a7775b35b860d5a7f71352294e07b559bab606b26d1ba77e747cc6b0cef75234e29d3afde424f

  • C:\Users\Admin\AppData\Local\Temp\1814910822.exe
    MD5

    8c97633fd038b6a9656548a6eb1a7613

    SHA1

    deefb0d8616717aa40f1983c4eab951facfe5687

    SHA256

    83e29bfd2de9e9ec05f19963ca6084b109c1c8427d3fcc720ce0bcd076fa074e

    SHA512

    1fe516050d7449ef6688465c079be080014520f66412974007a51ab904e42ecef24b50aff9791cb4e9ceee88edf12d1ce976457d5c09c5a30024be276cfa42a4

  • C:\Users\Admin\AppData\Local\Temp\2751316021.exe
    MD5

    b89ef7d964ca4a8ea690205ea88c962f

    SHA1

    1b3028eda26f6cca669c0e0772ca0142ff1527bb

    SHA256

    bc742502ac480d470e896d9b8391406aadfb8ddb343cba8e4eef9c107a94179d

    SHA512

    693c7386c5895fd34eba3e56fe7febce8643836625303d3fd3bd9097ec31678183a7f2eb1266456f6bdddea83064a98abafd157c5272702cecbe651795fe9560

  • C:\Users\Admin\AppData\Local\Temp\3091511092.exe
    MD5

    b89ef7d964ca4a8ea690205ea88c962f

    SHA1

    1b3028eda26f6cca669c0e0772ca0142ff1527bb

    SHA256

    bc742502ac480d470e896d9b8391406aadfb8ddb343cba8e4eef9c107a94179d

    SHA512

    693c7386c5895fd34eba3e56fe7febce8643836625303d3fd3bd9097ec31678183a7f2eb1266456f6bdddea83064a98abafd157c5272702cecbe651795fe9560

  • C:\Users\Admin\AppData\Local\Temp\3239631733.exe
    MD5

    8c97633fd038b6a9656548a6eb1a7613

    SHA1

    deefb0d8616717aa40f1983c4eab951facfe5687

    SHA256

    83e29bfd2de9e9ec05f19963ca6084b109c1c8427d3fcc720ce0bcd076fa074e

    SHA512

    1fe516050d7449ef6688465c079be080014520f66412974007a51ab904e42ecef24b50aff9791cb4e9ceee88edf12d1ce976457d5c09c5a30024be276cfa42a4

  • \16542656621731\svchost.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • \7237775230121\svchost.exe
    MD5

    fcbb520e5c66b1f024440e4eea650686

    SHA1

    710a7bd0d4791edc0f75d8d778c173c981120b5d

    SHA256

    f2af7f2de72d42d045309ea26b6c19076a42b4e6703fb15b5d40416ab37a8052

    SHA512

    0be757dd903f53394cfd46869e3694aa68f95efe1fcfba24649e9fdc33c489a4095fe0a22a5a50da4ae9cba35251790b0943365bf02fb52d7f6de3fa5173a733

  • \Users\Admin\AppData\Local\Temp\1274413983.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • \Users\Admin\AppData\Local\Temp\1480736834.exe
    MD5

    9ad727a371a0afc80274b2ae22f83abf

    SHA1

    0b4423282135f4df6647f194446474053b0b31da

    SHA256

    53f9ec1ef40ed5b55673e49fc4c8c72a372d53c93a10a94b72b5d7c8470d8306

    SHA512

    40bb2584538dabc0cea5e2c93275ad9244fd3e9b5ec0b2952a36d9b6ef46fec943a2a639112e6f8a8725066593807c9d0df9ecd86afd698ed7c5e6150756e731

  • \Users\Admin\AppData\Local\Temp\1725926510.exe
    MD5

    8c65b44e5d2d09d5c14e881a52386fd1

    SHA1

    848d6ec4d4b0ad4322bb9c4b33d4c03b6c39114d

    SHA256

    40f7fc587d70e0c3c1e8f955cec25fd86ada17928920b04714a2444289921992

    SHA512

    88ce9eb6d8d042cdff7e3413ba2e28ae0781f4e79f548e79da6a7775b35b860d5a7f71352294e07b559bab606b26d1ba77e747cc6b0cef75234e29d3afde424f

  • \Users\Admin\AppData\Local\Temp\1814013567.exe
    MD5

    8c65b44e5d2d09d5c14e881a52386fd1

    SHA1

    848d6ec4d4b0ad4322bb9c4b33d4c03b6c39114d

    SHA256

    40f7fc587d70e0c3c1e8f955cec25fd86ada17928920b04714a2444289921992

    SHA512

    88ce9eb6d8d042cdff7e3413ba2e28ae0781f4e79f548e79da6a7775b35b860d5a7f71352294e07b559bab606b26d1ba77e747cc6b0cef75234e29d3afde424f

  • \Users\Admin\AppData\Local\Temp\1814910822.exe
    MD5

    8c97633fd038b6a9656548a6eb1a7613

    SHA1

    deefb0d8616717aa40f1983c4eab951facfe5687

    SHA256

    83e29bfd2de9e9ec05f19963ca6084b109c1c8427d3fcc720ce0bcd076fa074e

    SHA512

    1fe516050d7449ef6688465c079be080014520f66412974007a51ab904e42ecef24b50aff9791cb4e9ceee88edf12d1ce976457d5c09c5a30024be276cfa42a4

  • \Users\Admin\AppData\Local\Temp\2751316021.exe
    MD5

    b89ef7d964ca4a8ea690205ea88c962f

    SHA1

    1b3028eda26f6cca669c0e0772ca0142ff1527bb

    SHA256

    bc742502ac480d470e896d9b8391406aadfb8ddb343cba8e4eef9c107a94179d

    SHA512

    693c7386c5895fd34eba3e56fe7febce8643836625303d3fd3bd9097ec31678183a7f2eb1266456f6bdddea83064a98abafd157c5272702cecbe651795fe9560

  • \Users\Admin\AppData\Local\Temp\3091511092.exe
    MD5

    b89ef7d964ca4a8ea690205ea88c962f

    SHA1

    1b3028eda26f6cca669c0e0772ca0142ff1527bb

    SHA256

    bc742502ac480d470e896d9b8391406aadfb8ddb343cba8e4eef9c107a94179d

    SHA512

    693c7386c5895fd34eba3e56fe7febce8643836625303d3fd3bd9097ec31678183a7f2eb1266456f6bdddea83064a98abafd157c5272702cecbe651795fe9560

  • \Users\Admin\AppData\Local\Temp\3239631733.exe
    MD5

    8c97633fd038b6a9656548a6eb1a7613

    SHA1

    deefb0d8616717aa40f1983c4eab951facfe5687

    SHA256

    83e29bfd2de9e9ec05f19963ca6084b109c1c8427d3fcc720ce0bcd076fa074e

    SHA512

    1fe516050d7449ef6688465c079be080014520f66412974007a51ab904e42ecef24b50aff9791cb4e9ceee88edf12d1ce976457d5c09c5a30024be276cfa42a4

  • memory/320-9-0x0000000000000000-mapping.dmp
  • memory/324-24-0x0000000000000000-mapping.dmp
  • memory/652-16-0x0000000000000000-mapping.dmp
  • memory/744-13-0x0000000000000000-mapping.dmp
  • memory/824-32-0x0000000000000000-mapping.dmp
  • memory/920-6-0x0000000000000000-mapping.dmp
  • memory/1436-28-0x0000000000000000-mapping.dmp
  • memory/1596-0-0x000007FEF6700000-0x000007FEF697A000-memory.dmp
    Filesize

    2.5MB

  • memory/1936-19-0x0000000000000000-mapping.dmp
  • memory/2012-2-0x0000000000000000-mapping.dmp
  • memory/2172-36-0x0000000000000000-mapping.dmp