Analysis
-
max time kernel
160s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 15:28
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe
-
Size
316KB
-
MD5
42823df5ab3340565e91967d9f545379
-
SHA1
edc3e540c2af58f2abb66fe5d2638fe689379833
-
SHA256
73e47190285f8901a44488f45fcdecaa6ad6dead9ba7d049795adbae48af4f6c
-
SHA512
f751adb54fe63e12ad248911e34f2cb856304123be88c30d55f651147c90353fba41230b67806cdd64e8795f38cdff898eb34bfd291bff767cef3ca2d0816be9
-
SSDEEP
3072:WvEczeu14403Cgega/YYn13VguOBft5QRt15VbvVXbz9btdu:CEcv144/getAfQZfbNrhzu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
wfplwfs.exepid Process 3468 wfplwfs.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
wfplwfs.exedescription pid Process procid_target PID 3468 set thread context of 5848 3468 wfplwfs.exe 104 PID 3468 set thread context of 3232 3468 wfplwfs.exe 116 PID 3468 set thread context of 5424 3468 wfplwfs.exe 120 PID 3468 set thread context of 5468 3468 wfplwfs.exe 123 PID 3468 set thread context of 1428 3468 wfplwfs.exe 126 PID 3468 set thread context of 3084 3468 wfplwfs.exe 132 PID 3468 set thread context of 4984 3468 wfplwfs.exe 135 PID 3468 set thread context of 3208 3468 wfplwfs.exe 138 -
Drops file in Windows directory 1 IoCs
Processes:
wfplwfs.exedescription ioc Process File created C:\Windows\Tasks\0d4d928c68f26f67.job wfplwfs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 1492 5848 WerFault.exe 104 4416 3232 WerFault.exe 116 4480 5424 WerFault.exe 120 1320 5468 WerFault.exe 123 5384 1428 WerFault.exe 126 5872 3084 WerFault.exe 132 4836 4984 WerFault.exe 135 -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 24 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid Process 5848 rundll32.exe 5848 rundll32.exe 5848 rundll32.exe 3232 rundll32.exe 3232 rundll32.exe 3232 rundll32.exe 5424 rundll32.exe 5424 rundll32.exe 5424 rundll32.exe 5468 rundll32.exe 5468 rundll32.exe 5468 rundll32.exe 1428 rundll32.exe 1428 rundll32.exe 1428 rundll32.exe 3084 rundll32.exe 3084 rundll32.exe 3084 rundll32.exe 4984 rundll32.exe 4984 rundll32.exe 4984 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.execmd.exewfplwfs.exedescription pid Process procid_target PID 5616 wrote to memory of 3468 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 100 PID 5616 wrote to memory of 3468 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 100 PID 5616 wrote to memory of 3468 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 100 PID 5616 wrote to memory of 712 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 101 PID 5616 wrote to memory of 712 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 101 PID 5616 wrote to memory of 712 5616 SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe 101 PID 712 wrote to memory of 5384 712 cmd.exe 103 PID 712 wrote to memory of 5384 712 cmd.exe 103 PID 712 wrote to memory of 5384 712 cmd.exe 103 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 5848 3468 wfplwfs.exe 104 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 3232 3468 wfplwfs.exe 116 PID 3468 wrote to memory of 1648 3468 wfplwfs.exe 119 PID 3468 wrote to memory of 1648 3468 wfplwfs.exe 119 PID 3468 wrote to memory of 1648 3468 wfplwfs.exe 119 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5424 3468 wfplwfs.exe 120 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 5468 3468 wfplwfs.exe 123 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 1428 3468 wfplwfs.exe 126 PID 3468 wrote to memory of 4448 3468 wfplwfs.exe 129 PID 3468 wrote to memory of 4448 3468 wfplwfs.exe 129 PID 3468 wrote to memory of 4448 3468 wfplwfs.exe 129 PID 3468 wrote to memory of 5348 3468 wfplwfs.exe 130 PID 3468 wrote to memory of 5348 3468 wfplwfs.exe 130 PID 3468 wrote to memory of 5348 3468 wfplwfs.exe 130 PID 3468 wrote to memory of 4188 3468 wfplwfs.exe 131 PID 3468 wrote to memory of 4188 3468 wfplwfs.exe 131 PID 3468 wrote to memory of 4188 3468 wfplwfs.exe 131 PID 3468 wrote to memory of 3084 3468 wfplwfs.exe 132 PID 3468 wrote to memory of 3084 3468 wfplwfs.exe 132 PID 3468 wrote to memory of 3084 3468 wfplwfs.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5616 -
C:\Users\Admin\AppData\Local\Temp\wfplwfs.exeC:\Users\Admin\AppData\Local\Temp\wfplwfs.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 17804⤵
- Program crash
PID:1492
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 17764⤵
- Program crash
PID:4416
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵PID:1648
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5424 -s 17764⤵
- Program crash
PID:4480
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:5468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 17724⤵
- Program crash
PID:1320
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 17764⤵
- Program crash
PID:5384
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵PID:4448
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵PID:5348
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵PID:4188
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 17804⤵
- Program crash
PID:5872
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 17764⤵
- Program crash
PID:4836
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe3⤵
- Suspicious use of SetWindowsHookEx
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen27.21664.27047.32071.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:5384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5848 -ip 58481⤵PID:4764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4468 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3232 -ip 32321⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5424 -ip 54241⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5468 -ip 54681⤵PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1428 -ip 14281⤵PID:5296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3084 -ip 30841⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4984 -ip 49841⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5ed7321dfc04f801d87ab2f3b4abcb8fb
SHA193a73a1679265a71e42a4d4f7db2099ef109df85
SHA2569537bad08de11149d3ea8528ee94e9feb7927d69e933315357d3f466312ade3e
SHA512d5cc6e876ef7b05ec4a18c20c3d2e600247b35d69d0dc9f4576408be781c127dde22c7220c6ceb83987d6c07380a6240efa6b82ed8c750e6e32f14da2dce1f89
-
Filesize
1KB
MD512cf60e57791e7a8bd78033c9f308931
SHA1f6c8a295064f7fa8553295e3cd8a9c62352f7c2c
SHA2562f9f2fe135d66c296ab6071d01529623bac31d4a63ab073be3c6c1e20d34f50a
SHA51272735d76803980afe7260d713a377f82316fa24109f1d2767b352984aa53d4a5e441a89d99aa3fdb32042dcb61b43d88465272bc98552892747829d7986cf3b2
-
Filesize
2KB
MD5561a5a310ac6505c1dc2029a61632617
SHA1f267ab458ec5d0f008a235461e466b1fd3ed14ee
SHA256b41bd7c17b6bdfe6ae0d0dbbb5ce92fd38c4696833ae3333a1d81cf7e38d6e35
SHA5124edb7ef8313e20bbc73fd96207c2076ce3bac0754a92bb00aff0259ffe1adf6f7e4d6917e7815fd643139a08bd4a0f325f66982378f94483ce1ee0924df6d3c5
-
Filesize
2KB
MD593a1a761d17ca266066a4b8e286dac1d
SHA163b13d8f13fe092aa1cd18dfea86c8c4cf2d5a8d
SHA256bad6f97f076cf04517a03820b486a2ffe564c2d0ef350932612cc40beec39f6a
SHA5125d3360d096da7a6b724cc68504dac6691285807f2aca361bbe27ca22acdfe734abf4ee4a4e2f9c55d7f94bb22d50062b19af0a4dd34939cf4673baa1746871bc