Analysis
-
max time kernel
125s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
27-03-2021 19:32
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe
-
Size
644KB
-
MD5
b68f0ee033a8cd19ce47f6ae4f0eaee4
-
SHA1
129e9dd019f62810a669b29bf44e3eca485c9c5a
-
SHA256
2ce81e2dd2330f10eb414e56222cd1ba4c26591381f07e199b08f623b8c4b8f9
-
SHA512
bf152424f47b407ce990ade08d784d33bae18c0747622eb4df97455d901b54b7e5053cb0823e31f8b79905f2da86ac29440a035493299b19d54ed1b6de9e1fdb
Malware Config
Extracted
cryptbot
bafoe62.top
morurt06.top
-
payload_url
http://akpgi08.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1212-3-0x00000000025F0000-0x00000000026CF000-memory.dmp family_cryptbot behavioral2/memory/1212-4-0x0000000000400000-0x00000000004E3000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
Processes:
WScript.exeflow pid process 34 416 WScript.exe 36 416 WScript.exe 38 416 WScript.exe 40 416 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Lunyt.exeSul.exe.comSul.exe.comtxactnwmqrq.exepid process 3520 Lunyt.exe 3108 Sul.exe.com 936 Sul.exe.com 2232 txactnwmqrq.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exeSul.exe.comdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Sul.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Sul.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2060 timeout.exe -
Modifies registry class 1 IoCs
Processes:
Sul.exe.comdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000_Classes\Local Settings Sul.exe.com -
Processes:
WScript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exepid process 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.execmd.exeLunyt.execmd.execmd.exeSul.exe.comSul.exe.comdescription pid process target process PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe Lunyt.exe PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe Lunyt.exe PID 1212 wrote to memory of 3520 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe Lunyt.exe PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe cmd.exe PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe cmd.exe PID 1212 wrote to memory of 1364 1212 SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe cmd.exe PID 1364 wrote to memory of 2060 1364 cmd.exe timeout.exe PID 1364 wrote to memory of 2060 1364 cmd.exe timeout.exe PID 1364 wrote to memory of 2060 1364 cmd.exe timeout.exe PID 3520 wrote to memory of 4048 3520 Lunyt.exe at.exe PID 3520 wrote to memory of 4048 3520 Lunyt.exe at.exe PID 3520 wrote to memory of 4048 3520 Lunyt.exe at.exe PID 3520 wrote to memory of 3900 3520 Lunyt.exe cmd.exe PID 3520 wrote to memory of 3900 3520 Lunyt.exe cmd.exe PID 3520 wrote to memory of 3900 3520 Lunyt.exe cmd.exe PID 3900 wrote to memory of 2756 3900 cmd.exe cmd.exe PID 3900 wrote to memory of 2756 3900 cmd.exe cmd.exe PID 3900 wrote to memory of 2756 3900 cmd.exe cmd.exe PID 2756 wrote to memory of 2764 2756 cmd.exe findstr.exe PID 2756 wrote to memory of 2764 2756 cmd.exe findstr.exe PID 2756 wrote to memory of 2764 2756 cmd.exe findstr.exe PID 2756 wrote to memory of 3108 2756 cmd.exe Sul.exe.com PID 2756 wrote to memory of 3108 2756 cmd.exe Sul.exe.com PID 2756 wrote to memory of 3108 2756 cmd.exe Sul.exe.com PID 2756 wrote to memory of 2180 2756 cmd.exe PING.EXE PID 2756 wrote to memory of 2180 2756 cmd.exe PING.EXE PID 2756 wrote to memory of 2180 2756 cmd.exe PING.EXE PID 3108 wrote to memory of 936 3108 Sul.exe.com Sul.exe.com PID 3108 wrote to memory of 936 3108 Sul.exe.com Sul.exe.com PID 3108 wrote to memory of 936 3108 Sul.exe.com Sul.exe.com PID 936 wrote to memory of 2232 936 Sul.exe.com txactnwmqrq.exe PID 936 wrote to memory of 2232 936 Sul.exe.com txactnwmqrq.exe PID 936 wrote to memory of 2232 936 Sul.exe.com txactnwmqrq.exe PID 936 wrote to memory of 1880 936 Sul.exe.com WScript.exe PID 936 wrote to memory of 1880 936 Sul.exe.com WScript.exe PID 936 wrote to memory of 1880 936 Sul.exe.com WScript.exe PID 936 wrote to memory of 416 936 Sul.exe.com WScript.exe PID 936 wrote to memory of 416 936 Sul.exe.com WScript.exe PID 936 wrote to memory of 416 936 Sul.exe.com WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Lunyt.exe"C:\Users\Admin\AppData\Local\Temp\Lunyt.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe"3⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Sia.mid3⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^sqZPiXvLzDYkNszeALrJmTZIWbPkHfMPSMhcBWstuiZlwoihFdkUquJbqdSKilttRpzqtYBExYCsTPHOfBGdrRPLrPx$" Mese.mid5⤵PID:2764
-
-
C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.comSul.exe.com S5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.comC:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com S6⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe"C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe"7⤵
- Executes dropped EXE
PID:2232
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\oqjwusjilv.vbs"7⤵PID:1880
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\efntreug.vbs"7⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:416
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 305⤵
- Runs ping.exe
PID:2180
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a2bb6fcbbbe65cd7945fa2577540bed4
SHA1212901effdf062dc1ba6c4bf8165e58da3725810
SHA2560790c012d55f486f92064bd63be8866aa26d181067f9c2ad2192a7bb41061eb9
SHA512b0c66450c4ffd87da96e7501dbb77e1af5d778c4c7b7b76d84f12311dd915bf2cf2ac00f2e91c2043d325474f161382b32e304fe22449270054f512345a90587
-
MD5
a2bb6fcbbbe65cd7945fa2577540bed4
SHA1212901effdf062dc1ba6c4bf8165e58da3725810
SHA2560790c012d55f486f92064bd63be8866aa26d181067f9c2ad2192a7bb41061eb9
SHA512b0c66450c4ffd87da96e7501dbb77e1af5d778c4c7b7b76d84f12311dd915bf2cf2ac00f2e91c2043d325474f161382b32e304fe22449270054f512345a90587
-
MD5
fb2651dfc218558c1d059be35eb11bc6
SHA1a4ed42b4604ecdff2dee1d05490e9eb15f948e1e
SHA256daf9e4aba835994b4a294dbca747b59b3f113088b836b68bedefed8545217f17
SHA512c495aa473b7aec56c6d3a59a54db8d4057e13731e523cbc59aeb06ad0f67dcf9fb44a36580227dc10326b0e0538b5e27aa8dca4c3daf0a53fed5f002290cfed8
-
MD5
01dda2e06808c8ace9dc697b65043266
SHA144fdc636fcdf5cc585561daded1801b6a952a0e7
SHA2567afb3c26f9453b9b15a5987392e33345cbae0cba4ecc7d1d2cb314e0f5536230
SHA5123f4b6a65132c0cf5c7c5f5c19f334d2eef7d9a3b2c1d24faef8041c9595f881fb0aa2333c3453a62dbccf7de8ecb268624882a9b2c2a1f72b3a405dd7d57f401
-
MD5
90119dede2a0af5899ca506d9f0cfecd
SHA1acb469584d6d9e48861fca6dd8677dded07e509f
SHA2569a140e46319fd5f16f36f9dd16b778919d747491e99fee36ddd948085d35f8a7
SHA5127632b74ce425adc520ffb8e98b97910f9cc11081c4166a3d0b86b954f9fccb6c3850c2f5fc4f4a50e316b8262f2d66f7630f56ecf65e6d2e2757e3220188e556
-
MD5
6aef8367929028fa6354b39f5d182c94
SHA1c0cd68480db06c76e6c9f6bbcc3a24270e2eca38
SHA256e07b51b42493c027761ddb1b9a62febe6ff2866a84889736b4e110c1c86c4a96
SHA51252dbd02ed52fdc12aab539f0bcc5925e1334451676b7d738b8c250c02055db7b0c6b1412a4dee6c025be3a96570db8794698c341918a374929fc60a2a84fd8d9
-
MD5
e76c1f6aab20f7757e295fada78790f9
SHA1cb02f746d33a63b8c2ca10638ca3438bbfc51714
SHA256aea00740709419771acf3a08c0ce29d1208c0c5cf3ac2fafc3ef43691cb00582
SHA512e46aad4480236538f9f9bf8498ac043ad4f0f85798ae5313f043cbdd52ad57d79b82e2cc443e0e4963ead34eb25dab86df8e50190426e03155493514307d213f
-
MD5
e76c1f6aab20f7757e295fada78790f9
SHA1cb02f746d33a63b8c2ca10638ca3438bbfc51714
SHA256aea00740709419771acf3a08c0ce29d1208c0c5cf3ac2fafc3ef43691cb00582
SHA512e46aad4480236538f9f9bf8498ac043ad4f0f85798ae5313f043cbdd52ad57d79b82e2cc443e0e4963ead34eb25dab86df8e50190426e03155493514307d213f
-
MD5
6e541f1621f2e9c8d5f44644e7faec23
SHA110970ddf1e6b71d836ef21a66bed27995537a26d
SHA2569a2d03f76326ce622353638e93d0ae61aa4906ff034f6ea0645fcc5e55c7f7e2
SHA5125011c9850eb7aed58b629f6eef7d7e1d39a3ba666bd056c36cec901228baf2f15d547a9646dc2dd3bddb71d493a242e95b06d48650fc0e6bab7530ae7ad0397e
-
MD5
22863da5d8152ae2f483beb476a8b67f
SHA1416c5b4049ddc1a80da83b425d817c10d9ccb7ee
SHA256c325139e1e907055b16ad4d2a48e459d523db296d59d6f8ced2f8a7bd642c9e0
SHA512bb3ceb8476e5f6b82d452c033ceeb01236bdbb1d04fb96fe02383252ac01a4c4701bfd7c9c0bbb7a42a1164e4bddcf3f97aa506e6e7a5d2c2f72367f85e471df
-
MD5
a438575ccb68fe9e2323e7e054445736
SHA11ed7732e52d7a078e289cf678ac76d3b49e16c7d
SHA2566da746396d9cdf44c35c89296d8a15dd0e7df76988024312901054a654cee796
SHA512ff5742b9026f0ea843bce7e9ffa8760317972f7f23ef115ea75a7450402962ca4ced9e3d026ed3369e51f16fa910f14448ff13273a9237dc5aa14e96637663ed
-
MD5
a438575ccb68fe9e2323e7e054445736
SHA11ed7732e52d7a078e289cf678ac76d3b49e16c7d
SHA2566da746396d9cdf44c35c89296d8a15dd0e7df76988024312901054a654cee796
SHA512ff5742b9026f0ea843bce7e9ffa8760317972f7f23ef115ea75a7450402962ca4ced9e3d026ed3369e51f16fa910f14448ff13273a9237dc5aa14e96637663ed
-
MD5
c3d93ab38763494668e5ec084a071011
SHA1ccb374c23045eea5a1e78a792cbc80fbfac16198
SHA256c92f51784a538e74015c744d4c51e4b4b07afec9d9290949abfed9145b9635d9
SHA512ef6fee7f26dfde62eebb06a9761c3812cb067e26453a2d63021867ff84b3a2a5a3c32d72ec301a9cd0f61f44b51837ba7f840a97b361719697397812046f2045
-
MD5
eea882cb8acf258c6972a0e288b3ef20
SHA12a2d53de861c97be801e4807b7ebbe3435c82ace
SHA2569406f147eea55240e64def22c0446703c5afeb135e92a7f469441a2226efa9df
SHA5122acf3588ac290624af6b4b72e06cbcaeb8872ff3a0dab963cfe81b9b34dfd410cdadb456a0a3a50b41f7c539f0664a0d8b9d55ec1cbf57f51e9095e5234b79f3
-
MD5
5891c47644ccbdac229e688f00c5211f
SHA165d3a618fe0bb71255e951eb91c941f6fe6647be
SHA256cd3d106fb3a7bca9e78303a176ec2f21b3fdd041c174311969b572a692c1b88b
SHA5123a9cb4c0860c525d5434e5aba4f7bdf7a550b26a1e03e3ab81c4921b274f16e5bed7bfca9ce6ce6a474d3b464705417c3f3ae108bd21154d90d82d542a2ce0a4
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
78ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
MD5
4db743e44403eff2bb9c310c0b406d8e
SHA1dec654906cc5677902eafd92af9afe9f3f870286
SHA2560450d23d2a61f9b10f2bb677d667f348c0d1bff07b83a515745685131a73c753
SHA5125ed574d67e053da5d3ada5d2344fe902b1d0e6aeac9c9353859daf4802777706ef6e97051eb03f76c80e4d74b0f145fe6a1f145ea9f3c13ebbb486baf7540833
-
MD5
eea882cb8acf258c6972a0e288b3ef20
SHA12a2d53de861c97be801e4807b7ebbe3435c82ace
SHA2569406f147eea55240e64def22c0446703c5afeb135e92a7f469441a2226efa9df
SHA5122acf3588ac290624af6b4b72e06cbcaeb8872ff3a0dab963cfe81b9b34dfd410cdadb456a0a3a50b41f7c539f0664a0d8b9d55ec1cbf57f51e9095e5234b79f3