Analysis
-
max time kernel
92s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
09-03-2022 21:51
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe
-
Size
74KB
-
MD5
ba4380237e7a0f220deaaada1fddff73
-
SHA1
394b852855574cffa26a66bec083792a21f87f79
-
SHA256
57df82d0e4547407bdca25692313c2a95b07438991c4cfd44a85d85e5976a965
-
SHA512
5e70426b3547020f93c62764f418ff7d475f4bf772130b056f33884e7b155b9675a4af292b356bd9897c5e6c665488989d7400dfb452d8544d1252b3e3798142
Score
10/10
Malware Config
Signatures
-
VKeylogger
A keylogger first seen in Nov 2020.
-
VKeylogger Payload 1 IoCs
resource yara_rule behavioral2/memory/3912-130-0x0000000000370000-0x0000000000382000-memory.dmp family_vkeylogger -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\grerg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yrty = "C:\\Windows\\system32\\mshta.exe javascript:x=new%20ActiveXObject(\"wscript.shell\");v=x.RegRead(\"HKCU\\\\Software\\\\Microsoft\\\\SMSvcHost\\\\ComponentID\");eval(v);" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4376 set thread context of 3912 4376 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 79 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4376 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 3912 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3912 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3912 explorer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 3912 4376 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 79 PID 4376 wrote to memory of 3912 4376 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 79 PID 4376 wrote to memory of 3912 4376 SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.Siggen2.3475.2384.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3912
-