Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-11-2020 19:55
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll
-
Size
3.3MB
-
MD5
3ce1a9571feef80297bd3c7c33e53476
-
SHA1
bdc733c1c239adc0d10b89e630862f6fe692c189
-
SHA256
ec4171872384e62627b06976f6e513650087c00e8c42f70d6b9d29b54e18a8e6
-
SHA512
aee3109d59536bf0054a58a60f1a405c37fc08cfa16df1257dc79a771abc534458c78f71f2e54e3b0ad4a653669489537e24d42d98a9b2d63f8d2f81ad51e333
Malware Config
Extracted
Family
danabot
C2
172.81.129.196
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
45.147.228.92
rsa_pubkey.plain
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 15 4148 rundll32.exe 16 4148 rundll32.exe 17 4148 rundll32.exe 18 4148 rundll32.exe 19 4148 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 516 4788 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
WerFault.exepid process 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe 516 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 516 WerFault.exe Token: SeBackupPrivilege 516 WerFault.exe Token: SeDebugPrivilege 516 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 4764 wrote to memory of 4788 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 4788 4764 rundll32.exe rundll32.exe PID 4764 wrote to memory of 4788 4764 rundll32.exe rundll32.exe PID 4788 wrote to memory of 4148 4788 rundll32.exe rundll32.exe PID 4788 wrote to memory of 4148 4788 rundll32.exe rundll32.exe PID 4788 wrote to memory of 4148 4788 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen9.46491.30495.5886.dll,f03⤵
- Blocklisted process makes network request
PID:4148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 7363⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516