Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 19:55
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll
-
Size
3.3MB
-
MD5
3ce1a9571feef80297bd3c7c33e53476
-
SHA1
bdc733c1c239adc0d10b89e630862f6fe692c189
-
SHA256
ec4171872384e62627b06976f6e513650087c00e8c42f70d6b9d29b54e18a8e6
-
SHA512
aee3109d59536bf0054a58a60f1a405c37fc08cfa16df1257dc79a771abc534458c78f71f2e54e3b0ad4a653669489537e24d42d98a9b2d63f8d2f81ad51e333
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 5 1084 rundll32.exe 6 1084 rundll32.exe 7 1084 rundll32.exe 10 1084 rundll32.exe 11 1084 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 924 1928 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 924 WerFault.exe 924 WerFault.exe 924 WerFault.exe 924 WerFault.exe 924 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 924 WerFault.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1704 wrote to memory of 1928 1704 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 1084 1928 rundll32.exe rundll32.exe PID 1928 wrote to memory of 924 1928 rundll32.exe WerFault.exe PID 1928 wrote to memory of 924 1928 rundll32.exe WerFault.exe PID 1928 wrote to memory of 924 1928 rundll32.exe WerFault.exe PID 1928 wrote to memory of 924 1928 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,f03⤵
- Blocklisted process makes network request
PID:1084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 3723⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:924