Analysis
-
max time kernel
142s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 01:25
Behavioral task
behavioral1
Sample
sigima.exe
Resource
win7-20240704-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
sigima.exe
Resource
win10v2004-20240709-en
10 signatures
150 seconds
General
-
Target
sigima.exe
-
Size
3.9MB
-
MD5
032496eafa4a0b110d8c37b4c995228c
-
SHA1
3531c2a5723be8a775a1784e434a9c8943ba4f1a
-
SHA256
e9ebb65e312f6e7ecd0d3637c85b64e18ff92949a740f98deeba23d415c14c0c
-
SHA512
ceafb86a8a5810343bcdcaacb627555a7c31347c8d08deef19fe19f3449ead663ea3c81bcdcad52484552070f4a454bd0ca0507b0aef002ed61eaaa1a0a0a884
-
SSDEEP
98304:VFkMoq8JwkyKiWnA7FJ1I8j5haEdt9iDMDN:0i8/yKOJd/ZdtQoDN
Score
9/10
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sigima.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\frAQBc8Wsa1xVPfv\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\frAQBc8Wsa1xVPfv" sigima.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sigima.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sigima.exe -
resource yara_rule behavioral2/memory/2560-0-0x0000000140000000-0x0000000140BCC000-memory.dmp themida behavioral2/memory/2560-1-0x0000000140000000-0x0000000140BCC000-memory.dmp themida behavioral2/memory/2560-3-0x0000000140000000-0x0000000140BCC000-memory.dmp themida behavioral2/memory/2560-2-0x0000000140000000-0x0000000140BCC000-memory.dmp themida behavioral2/memory/2560-14-0x0000000140000000-0x0000000140BCC000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigima.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2560 sigima.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2560 sigima.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2560 sigima.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2560 wrote to memory of 4544 2560 sigima.exe 87 PID 2560 wrote to memory of 4544 2560 sigima.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\sigima.exe"C:\Users\Admin\AppData\Local\Temp\sigima.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Sets service image path in registry
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0A2⤵PID:4544
-