Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-10-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe
-
Size
279KB
-
MD5
d0cce7870080bd889dba1f4cfd2b3b26
-
SHA1
a973389aa0908d7b56115aff9cd4878fbd9381f9
-
SHA256
8ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
-
SHA512
5fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
SSDEEP
6144:imUMliX/k5k646sOcT86ISrQdoBX67Hgo2TWD:AMl6Y/fyQdWeHgo2a
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeUpdate.lnk SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe -
Loads dropped DLL 1 IoCs
pid Process 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{E4408B9715931204349748}\\{E4408B9715931204349748}.exe" SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1392 set thread context of 2140 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe 2140 svchost.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeSecurityPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeTakeOwnershipPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeLoadDriverPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeSystemProfilePrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeSystemtimePrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeProfSingleProcessPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeIncBasePriorityPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeCreatePagefilePrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeBackupPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeRestorePrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeShutdownPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeDebugPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeSystemEnvironmentPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeRemoteShutdownPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeUndockPrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: SeManageVolumePrivilege 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: 33 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: 34 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe Token: 35 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2140 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 28 PID 1392 wrote to memory of 2140 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 28 PID 1392 wrote to memory of 2140 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 28 PID 1392 wrote to memory of 2140 1392 SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe 28 PID 2140 wrote to memory of 2672 2140 svchost.exe 29 PID 2140 wrote to memory of 2672 2140 svchost.exe 29 PID 2140 wrote to memory of 2672 2140 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2140 -s 2283⤵PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5043e85e27e0dd45be904e947804d2b3b
SHA1400e5fdcb421413b0ad5c1221bfb3e57ea705fb6
SHA256c880eabcdfa15c504f4eeb12b4e65848682da32b869e36f6404b0d88ddb2a28b
SHA512d3489e74aba12638c5d4131d2a999855dd6de5b3990e7e9fd5d4df18db73ef510f2d79576dbb66077bc07d496c2098ad19696c894621e3a74a3caafd5564495a
-
Filesize
1KB
MD5c55e7b590134bae106d2d8170affe162
SHA113b61495d4b1460ecb770e42a923c880a73ad692
SHA2565d4c55ac6c8371c79f94a81c1e53fa50b0fa4231cda0fc9d93892739c723c7e7
SHA51299162c8512811021c31c98cffe306b3badd07e779ac73d6da16e16d7597c1c8112b1a78dc33a27f717b13333bedf6a804a757e5030f653aeea41a338492c9e27
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548