Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-04-2021 21:38
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe
Resource
win10v20210408
General
-
Target
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe
-
Size
1.1MB
-
MD5
0e5a32151bc2d235ca8b57bfd1684f6e
-
SHA1
db048b176a6f99934f13d1bac90a7918600a0f23
-
SHA256
3693a93f4ddbfa1eb9207e06cf87041b59b9b1ddfd866e6fbbbb52aaeae7ed83
-
SHA512
caaaf144653fb6295c53c47c4f91b52038c662aa50931dbdd78c7e2ca7da86ccf90022b47cf0db213f00fb70abcf622ecca9e9901628bad6d029149b97eeb732
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exepid process 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exeSecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exedescription pid process target process PID 4804 set thread context of 2212 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe PID 2212 set thread context of 3900 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe AppLaunch.exe PID 2212 set thread context of 4092 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 set thread context of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3540 3900 WerFault.exe AppLaunch.exe 4160 4092 WerFault.exe InstallUtil.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exepid process 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exepid process 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exepid process 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exeSecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exeWinMail.exedescription pid process target process PID 4804 wrote to memory of 2212 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe PID 4804 wrote to memory of 2212 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe PID 4804 wrote to memory of 2212 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe PID 4804 wrote to memory of 2212 4804 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe PID 2212 wrote to memory of 3900 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe AppLaunch.exe PID 2212 wrote to memory of 3900 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe AppLaunch.exe PID 2212 wrote to memory of 3900 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe AppLaunch.exe PID 2212 wrote to memory of 3900 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe AppLaunch.exe PID 2212 wrote to memory of 4092 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 4092 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 4092 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 4092 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1216 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe InstallUtil.exe PID 2212 wrote to memory of 1560 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe WinMail.exe PID 2212 wrote to memory of 1560 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe WinMail.exe PID 2212 wrote to memory of 1560 2212 SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe WinMail.exe PID 1560 wrote to memory of 1672 1560 WinMail.exe WinMail.exe PID 1560 wrote to memory of 1672 1560 WinMail.exe WinMail.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen13.7926.26442.26251.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 884⤵
- Program crash
PID:3540
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 884⤵
- Program crash
PID:4160
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵PID:1216
-
-
C:\Program Files (x86)\Windows Mail\WinMail.exe"C:\Program Files (x86)\Windows Mail\WinMail" OCInstallUserConfigOE3⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE4⤵PID:1672
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4f85ab31a81e897315fc38373221023f
SHA13e73f679a385e34e0bd50a20d6db357e455049b7
SHA2561c8d220052a771eda30d0a58aa4c74a0260595488d4468a57616b20da55be820
SHA512c313d113297da309f5cc93067db5478504f506b4d12922b39bdbcc0c507b4ab2e4c9174ab96d428ff9d8abb95efc86f414d6a2df54f81465780d192991d5a4f8