Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2022 10:44
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe
Resource
win7-20220718-en
windows7-x64
6 signatures
150 seconds
General
-
Target
SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe
-
Size
4.0MB
-
MD5
c24ba1762d2da4b568a2e26f22f9c64f
-
SHA1
80109682d40260506b1c1b27aa0552c37c8b048c
-
SHA256
a3399562b281d5dd39a742eebe7a9de6ae46360f6226c4e005f31e1d73c5f7e3
-
SHA512
7dd08ee1a655cc7dc2f4090a99f572b2e5d733e5533fbfa372ad2b26a16df80165d53b403e03520551fdf6ef3884ab261e02a4e6e56799dac57d9c19c2cdb6fc
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3812-130-0x0000000000590000-0x0000000001368000-memory.dmp family_ytstealer behavioral2/memory/3812-132-0x0000000000590000-0x0000000001368000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral2/memory/3812-130-0x0000000000590000-0x0000000001368000-memory.dmp upx behavioral2/memory/3812-132-0x0000000000590000-0x0000000001368000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen18.29800.10676.exepid process 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen18.29800.10676.execmd.exedescription pid process target process PID 3812 wrote to memory of 5016 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe cmd.exe PID 3812 wrote to memory of 5016 3812 SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe cmd.exe PID 5016 wrote to memory of 1032 5016 cmd.exe choice.exe PID 5016 wrote to memory of 1032 5016 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen18.29800.10676.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1032
-
-