Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
27-03-2021 19:32
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe
-
Size
644KB
-
MD5
b68f0ee033a8cd19ce47f6ae4f0eaee4
-
SHA1
129e9dd019f62810a669b29bf44e3eca485c9c5a
-
SHA256
2ce81e2dd2330f10eb414e56222cd1ba4c26591381f07e199b08f623b8c4b8f9
-
SHA512
bf152424f47b407ce990ade08d784d33bae18c0747622eb4df97455d901b54b7e5053cb0823e31f8b79905f2da86ac29440a035493299b19d54ed1b6de9e1fdb
Malware Config
Extracted
cryptbot
bafoe62.top
morurt06.top
-
payload_url
http://akpgi08.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral2/memory/1212-3-0x00000000025F0000-0x00000000026CF000-memory.dmp family_cryptbot behavioral2/memory/1212-4-0x0000000000400000-0x00000000004E3000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 34 416 WScript.exe 36 416 WScript.exe 38 416 WScript.exe 40 416 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 3520 Lunyt.exe 3108 Sul.exe.com 936 Sul.exe.com 2232 txactnwmqrq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sul.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sul.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2060 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings Sul.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2180 PING.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 79 PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 79 PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 79 PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 80 PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 80 PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 80 PID 1364 wrote to memory of 2060 1364 cmd.exe 82 PID 1364 wrote to memory of 2060 1364 cmd.exe 82 PID 1364 wrote to memory of 2060 1364 cmd.exe 82 PID 3520 wrote to memory of 4048 3520 Lunyt.exe 83 PID 3520 wrote to memory of 4048 3520 Lunyt.exe 83 PID 3520 wrote to memory of 4048 3520 Lunyt.exe 83 PID 3520 wrote to memory of 3900 3520 Lunyt.exe 85 PID 3520 wrote to memory of 3900 3520 Lunyt.exe 85 PID 3520 wrote to memory of 3900 3520 Lunyt.exe 85 PID 3900 wrote to memory of 2756 3900 cmd.exe 87 PID 3900 wrote to memory of 2756 3900 cmd.exe 87 PID 3900 wrote to memory of 2756 3900 cmd.exe 87 PID 2756 wrote to memory of 2764 2756 cmd.exe 88 PID 2756 wrote to memory of 2764 2756 cmd.exe 88 PID 2756 wrote to memory of 2764 2756 cmd.exe 88 PID 2756 wrote to memory of 3108 2756 cmd.exe 89 PID 2756 wrote to memory of 3108 2756 cmd.exe 89 PID 2756 wrote to memory of 3108 2756 cmd.exe 89 PID 2756 wrote to memory of 2180 2756 cmd.exe 90 PID 2756 wrote to memory of 2180 2756 cmd.exe 90 PID 2756 wrote to memory of 2180 2756 cmd.exe 90 PID 3108 wrote to memory of 936 3108 Sul.exe.com 91 PID 3108 wrote to memory of 936 3108 Sul.exe.com 91 PID 3108 wrote to memory of 936 3108 Sul.exe.com 91 PID 936 wrote to memory of 2232 936 Sul.exe.com 92 PID 936 wrote to memory of 2232 936 Sul.exe.com 92 PID 936 wrote to memory of 2232 936 Sul.exe.com 92 PID 936 wrote to memory of 1880 936 Sul.exe.com 93 PID 936 wrote to memory of 1880 936 Sul.exe.com 93 PID 936 wrote to memory of 1880 936 Sul.exe.com 93 PID 936 wrote to memory of 416 936 Sul.exe.com 94 PID 936 wrote to memory of 416 936 Sul.exe.com 94 PID 936 wrote to memory of 416 936 Sul.exe.com 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Lunyt.exe"C:\Users\Admin\AppData\Local\Temp\Lunyt.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"3⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Sia.mid3⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^sqZPiXvLzDYkNszeALrJmTZIWbPkHfMPSMhcBWstuiZlwoihFdkUquJbqdSKilttRpzqtYBExYCsTPHOfBGdrRPLrPx$" Mese.mid5⤵PID:2764
-
-
C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.comSul.exe.com S5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.comC:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com S6⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe"C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe"7⤵
- Executes dropped EXE
PID:2232
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\oqjwusjilv.vbs"7⤵PID:1880
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\efntreug.vbs"7⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:416
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 305⤵
- Runs ping.exe
PID:2180
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2060
-
-