Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
-
Size
279KB
-
MD5
d0cce7870080bd889dba1f4cfd2b3b26
-
SHA1
a973389aa0908d7b56115aff9cd4878fbd9381f9
-
SHA256
8ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
-
SHA512
5fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
SSDEEP
6144:imUMliX/k5k646sOcT86ISrQdoBX67Hgo2TWD:AMl6Y/fyQdWeHgo2a
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeUpdate.lnk SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Loads dropped DLL 1 IoCs
pid Process 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{8021D65EFBA22925382193}\\{8021D65EFBA22925382193}.exe" SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 1472 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe 1472 svchost.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSecurityPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeTakeOwnershipPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeLoadDriverPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemProfilePrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemtimePrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeProfSingleProcessPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeIncBasePriorityPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeCreatePagefilePrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeBackupPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeRestorePrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeShutdownPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeDebugPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemEnvironmentPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeRemoteShutdownPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeUndockPrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeManageVolumePrivilege 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 33 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 34 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 35 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1472 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 2460 wrote to memory of 1472 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 2460 wrote to memory of 1472 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 2460 wrote to memory of 1472 2460 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 1472 wrote to memory of 3056 1472 svchost.exe 32 PID 1472 wrote to memory of 3056 1472 svchost.exe 32 PID 1472 wrote to memory of 3056 1472 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1472 -s 2243⤵PID:3056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c55e7b590134bae106d2d8170affe162
SHA113b61495d4b1460ecb770e42a923c880a73ad692
SHA2565d4c55ac6c8371c79f94a81c1e53fa50b0fa4231cda0fc9d93892739c723c7e7
SHA51299162c8512811021c31c98cffe306b3badd07e779ac73d6da16e16d7597c1c8112b1a78dc33a27f717b13333bedf6a804a757e5030f653aeea41a338492c9e27
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548