Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen15.23944.32230.18481.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen15.23944.32230.18481.exe
Resource
win10v2004-20240802-en
Target
SecuriteInfo.com.Trojan.Siggen15.23944.32230.18481.exe
Size
46.5MB
MD5
2ea9ca2f81ccc2afdc9f36bc26dfa339
SHA1
d3fbbd9c0e739a612c569f1a137963dc9d6d6311
SHA256
2490df2ea44e402731de34c930b0a311ad4a574a17160c5f89c1f07ed207351a
SHA512
fb4bd77c693f4dbb0f2623498d09ecb4ff041efa74330ace6b455652098c2e1d519fdc2be99872633dad44e9fa9a4eeda608e28e30cf2da57e7e6b1f732c3850
SSDEEP
786432:lkgWUtD2OHHW7yGlge2IohIyIuw8Zp4XP2ii3uSC0/tLJjQj88KwTARUjP5HJPlJ:JW2GEIozIJ8cPbieS1tLJAKwTd
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageOCSPSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
X:\develop\installer\setup_1\Release\SetupProxyCommon.pdb
LoadLibraryA
LoadLibraryW
GetModuleHandleW
FindResourceW
GetDiskFreeSpaceExA
RemoveDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
lstrcmpiW
OutputDebugStringA
GetModuleFileNameA
GetTempPathA
CreateDirectoryA
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
DeleteFileA
FindFirstFileA
FindNextFileA
GetTickCount
GetSystemInfo
CloseHandle
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetOEMCP
FindClose
SizeofResource
LoadResource
Sleep
GetLastError
GetCurrentThreadId
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
OpenProcess
GetProcAddress
FreeLibrary
LockResource
WaitForSingleObject
CreateDirectoryW
GetTempPathW
GetACP
IsValidCodePage
SetFilePointerEx
ReadConsoleW
GetConsoleCP
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetFileType
HeapSize
GetModuleHandleExW
ExitProcess
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetStartupInfoW
TlsFree
TlsSetValue
GetModuleFileNameW
GetCommandLineW
TlsGetValue
TlsAlloc
GetVersionExA
LocalFree
FormatMessageA
FormatMessageW
SetConsoleCtrlHandler
GetProcessTimes
GetStdHandle
SetFileApisToOEM
GetConsoleScreenBufferInfo
AreFileApisANSI
SetProcessAffinityMask
MapViewOfFile
UnmapViewOfFile
OpenEventA
OpenFileMappingA
VirtualAlloc
VirtualFree
GetModuleHandleA
GetSystemTimeAsFileTime
FileTimeToDosDateTime
CompareFileTime
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FileTimeToLocalFileTime
SetLastError
SetFileTime
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
SetFileAttributesW
MoveFileA
MoveFileW
InitializeCriticalSection
SetEvent
GetLogicalDriveStringsA
GetLogicalDriveStringsW
GetFileAttributesW
GetFileSize
WriteFile
ReadFile
DeviceIoControl
SetEndOfFile
SetFilePointer
CreateFileA
GetFileInformationByHandle
LoadLibraryExW
GetConsoleMode
SetConsoleMode
FileTimeToSystemTime
GetDiskFreeSpaceA
GetDiskFreeSpaceW
GlobalMemoryStatus
EncodePointer
DecodePointer
GetStringTypeW
HeapFree
HeapAlloc
GetCommandLineA
RaiseException
RtlUnwind
IsDebuggerPresent
IsProcessorFeaturePresent
CreateThread
ExitThread
HeapReAlloc
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
FindWindowW
GetWindowThreadProcessId
CharLowerW
PostMessageW
CharUpperA
CharUpperW
ExitWindowsEx
wsprintfW
LoadStringA
MessageBoxW
GetFileSecurityW
SetFileSecurityW
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
CheckTokenMembership
DuplicateTokenEx
LookupPrivilegeValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
CommandLineToArgvW
ShellExecuteExW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetFolderPathW
ShellExecuteW
CoCreateInstance
CoCreateGuid
CoTaskMemFree
PathAppendA
StrCpyW
PathRemoveFileSpecW
PathAppendW
StrChrW
StrCpyNW
PathFileExistsA
PathFileExistsW
StrRChrW
StrCatW
StrCmpW
NetApiBufferFree
NetWkstaGetInfo
GetAdaptersInfo
MiniDumpWriteDump
VariantCopy
VariantClear
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ