Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/10/2024, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
Resource
win10v2004-20241007-en
General
-
Target
SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe
-
Size
279KB
-
MD5
d0cce7870080bd889dba1f4cfd2b3b26
-
SHA1
a973389aa0908d7b56115aff9cd4878fbd9381f9
-
SHA256
8ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
-
SHA512
5fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
SSDEEP
6144:imUMliX/k5k646sOcT86ISrQdoBX67Hgo2TWD:AMl6Y/fyQdWeHgo2a
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svchost.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MicrosoftEdgeUpdate.lnk SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Loads dropped DLL 1 IoCs
pid Process 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\{11539111A03D2176218386}\\{11539111A03D2176218386}.exe" SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 1736 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSecurityPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeTakeOwnershipPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeLoadDriverPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemProfilePrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemtimePrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeProfSingleProcessPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeIncBasePriorityPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeCreatePagefilePrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeBackupPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeRestorePrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeShutdownPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeDebugPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeSystemEnvironmentPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeRemoteShutdownPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeUndockPrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: SeManageVolumePrivilege 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 33 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 34 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe Token: 35 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1736 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 3004 wrote to memory of 1736 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 3004 wrote to memory of 1736 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 3004 wrote to memory of 1736 3004 SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe 31 PID 1736 wrote to memory of 2892 1736 svchost.exe 32 PID 1736 wrote to memory of 2892 1736 svchost.exe 32 PID 1736 wrote to memory of 2892 1736 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen29.53958.6245.21630.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1736 -s 2203⤵PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c55e7b590134bae106d2d8170affe162
SHA113b61495d4b1460ecb770e42a923c880a73ad692
SHA2565d4c55ac6c8371c79f94a81c1e53fa50b0fa4231cda0fc9d93892739c723c7e7
SHA51299162c8512811021c31c98cffe306b3badd07e779ac73d6da16e16d7597c1c8112b1a78dc33a27f717b13333bedf6a804a757e5030f653aeea41a338492c9e27
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548