Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 15:07
Behavioral task
behavioral1
Sample
SGImini.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SGImini.exe
Resource
win10v2004-20230220-en
General
-
Target
SGImini.exe
-
Size
30.6MB
-
MD5
ee470b6291fec8e84466d2b2bf62e20f
-
SHA1
2ca7c75dc2cd254ad608b7d18993b89bb57de087
-
SHA256
b302802afcf425b8620e9a1078598eaac8dcf5dedd3515e3b09d15ca46304bca
-
SHA512
bc1cfb3c14d174aba344b2ed545aa3fca087b0117d76c068a79d06533b539b6c427c0d6f57f95b074e75c3ae9a5a21bdc4bf7dd88a79ae2e79233cb97ce08d7d
-
SSDEEP
786432:AL/jqgODjcF6z+u9mqUbwvhpsk+WTqCfHD9oErI8Cs:ALuhGuwqmw5p8WnHDR5Cs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
SGIYX.exepid process 2028 SGIYX.exe -
Processes:
resource yara_rule behavioral2/memory/956-187-0x0000000000400000-0x0000000004B66000-memory.dmp upx behavioral2/memory/956-193-0x0000000000400000-0x0000000004B66000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
SGImini.exedescription ioc process File opened (read-only) \??\L: SGImini.exe File opened (read-only) \??\O: SGImini.exe File opened (read-only) \??\X: SGImini.exe File opened (read-only) \??\V: SGImini.exe File opened (read-only) \??\D: SGImini.exe File opened (read-only) \??\G: SGImini.exe File opened (read-only) \??\H: SGImini.exe File opened (read-only) \??\K: SGImini.exe File opened (read-only) \??\P: SGImini.exe File opened (read-only) \??\Q: SGImini.exe File opened (read-only) \??\R: SGImini.exe File opened (read-only) \??\W: SGImini.exe File opened (read-only) \??\E: SGImini.exe File opened (read-only) \??\F: SGImini.exe File opened (read-only) \??\I: SGImini.exe File opened (read-only) \??\J: SGImini.exe File opened (read-only) \??\M: SGImini.exe File opened (read-only) \??\N: SGImini.exe File opened (read-only) \??\T: SGImini.exe File opened (read-only) \??\Y: SGImini.exe File opened (read-only) \??\S: SGImini.exe File opened (read-only) \??\U: SGImini.exe File opened (read-only) \??\Z: SGImini.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
SGIYX.exedescription ioc process File opened for modification \??\PhysicalDrive0 SGIYX.exe -
Checks SCSI registry key(s) 3 TTPs 14 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
SGImini.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service SGImini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service SGImini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags SGImini.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID SGImini.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SGImini.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SGImini.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SGImini.exe -
Modifies registry class 24 IoCs
Processes:
SGImini.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile\shell\open\command SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile\shell\open SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SGImini.exe \"%1\"" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile\shell\open\command SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile\ = "Gho映像文件" SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WIM\ = "WIMFile" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile\shell SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ESD SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile\ = "ESD映像文件" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile\shell SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile\shell SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile\shell\open SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.WIM SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile\ = "WIM映像文件" SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.GHO\ = "GHOFile" SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GHOFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SGImini.exe \"%1\"" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WIMFile\shell\open\command SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ESD\ = "ESDFile" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile\shell\open SGImini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ESDFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SGImini.exe \"%1\"" SGImini.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.GHO SGImini.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SGImini.exedescription pid process Token: SeSystemEnvironmentPrivilege 956 SGImini.exe Token: SeSystemEnvironmentPrivilege 956 SGImini.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SGImini.exepid process 956 SGImini.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SGImini.exedescription pid process target process PID 956 wrote to memory of 2028 956 SGImini.exe SGIYX.exe PID 956 wrote to memory of 2028 956 SGImini.exe SGIYX.exe PID 956 wrote to memory of 2028 956 SGImini.exe SGIYX.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SGImini.exe"C:\Users\Admin\AppData\Local\Temp\SGImini.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\~SYEHyPStm\SGIYX.exeC:\Users\Admin\AppData\Local\Temp\~SYEHyPStm\SGIYX.exe -mohong2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~SYEHyPStm\SGIYX.exeFilesize
23KB
MD50cb9c0329fefacfd49c0f76c41c12b42
SHA135f3503e41adb04bb61fdc7a6a111b06522f8655
SHA256173eea9ed8cfb54b85795b6de94dce01be1132ef7cfced9825a7632cb19c7c2d
SHA512461140c9bcc6cbb46f0e827b6079775ffd68ff76a9ed5788baa20e373ce84a8dfaecc8ed60fa28392002551cbbdb4fda3c954290f8a3a281c31ad7ba91345d55
-
C:\Users\Admin\AppData\Local\Temp\~SYEHyPStm\SGIYX.exeFilesize
23KB
MD50cb9c0329fefacfd49c0f76c41c12b42
SHA135f3503e41adb04bb61fdc7a6a111b06522f8655
SHA256173eea9ed8cfb54b85795b6de94dce01be1132ef7cfced9825a7632cb19c7c2d
SHA512461140c9bcc6cbb46f0e827b6079775ffd68ff76a9ed5788baa20e373ce84a8dfaecc8ed60fa28392002551cbbdb4fda3c954290f8a3a281c31ad7ba91345d55
-
C:\Windows\Temp\sgiRun.logFilesize
483B
MD5f498eca19c4f104d7d472ea2a3569a73
SHA1124f2b0a51099701bc512e29ab0e7da13b0220aa
SHA256da401f93efbd4d1220823dc88e79da6f487f55212d35d23bbb8cc13e73d7aa54
SHA512fc35a315ddc1103e1f123214c5d80d964e81fd57d704a8552bd47574d43e2ead0ea25e525fb264f815177e5016e3e45e9c2e7d75262526e327db26d894e7ed9a
-
memory/956-168-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/956-187-0x0000000000400000-0x0000000004B66000-memory.dmpFilesize
71.4MB
-
memory/956-188-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/956-193-0x0000000000400000-0x0000000004B66000-memory.dmpFilesize
71.4MB
-
memory/2028-170-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB