Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09-03-2022 21:51
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
-
Size
74KB
-
MD5
ba4380237e7a0f220deaaada1fddff73
-
SHA1
394b852855574cffa26a66bec083792a21f87f79
-
SHA256
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965
-
SHA512
5e70426b3547020f93c62764f418ff7d475f4bf772130b056f33884e7b155b9675a4af292b356bd9897c5e6c665488989d7400dfb452d8544d1252b3e3798142
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 1 IoCs
resource yara_rule behavioral1/memory/1740-58-0x0000000000080000-0x0000000000092000-memory.dmp family_vkeylogger -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\yrty = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\grerg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 480 set thread context of 1740 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 27 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 1740 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1740 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1740 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 480 wrote to memory of 1740 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 27 PID 480 wrote to memory of 1740 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 27 PID 480 wrote to memory of 1740 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 27 PID 480 wrote to memory of 1740 480 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1740
-