Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe
Resource
win10v2004-20241007-en
General
-
Target
246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe
-
Size
121KB
-
MD5
5dce69c450262d7a5d48cdc8fccad2d7
-
SHA1
11cd8fa07e2314287099aaf4fbedb5dcc1fcf62a
-
SHA256
246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823
-
SHA512
7f5c2f5e6a02990adf6d638a8368f07a2f949dfedd7197e342c7467cc0ff4af5480ba2585060986f65e3f62efcdb80c037b89815db095326890269ef31db836a
-
SSDEEP
3072:MV3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPJR:ht5hBPi0BW69hd1MMdxPe9N9uA069TBb
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2816 powershell.exe 2584 powershell.exe 2580 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2000 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2816 powershell.exe 2584 powershell.exe 2580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2372 2080 246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe 30 PID 2080 wrote to memory of 2372 2080 246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe 30 PID 2080 wrote to memory of 2372 2080 246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe 30 PID 2372 wrote to memory of 2760 2372 cmd.exe 32 PID 2372 wrote to memory of 2760 2372 cmd.exe 32 PID 2372 wrote to memory of 2760 2372 cmd.exe 32 PID 2372 wrote to memory of 2816 2372 cmd.exe 33 PID 2372 wrote to memory of 2816 2372 cmd.exe 33 PID 2372 wrote to memory of 2816 2372 cmd.exe 33 PID 2372 wrote to memory of 2584 2372 cmd.exe 34 PID 2372 wrote to memory of 2584 2372 cmd.exe 34 PID 2372 wrote to memory of 2584 2372 cmd.exe 34 PID 2372 wrote to memory of 2580 2372 cmd.exe 35 PID 2372 wrote to memory of 2580 2372 cmd.exe 35 PID 2372 wrote to memory of 2580 2372 cmd.exe 35 PID 2372 wrote to memory of 2000 2372 cmd.exe 36 PID 2372 wrote to memory of 2000 2372 cmd.exe 36 PID 2372 wrote to memory of 2000 2372 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1E4A.tmp\1E4B.tmp\1E4C.bat C:\Users\Admin\AppData\Local\Temp\246d03f418d4eb9a19ead89eb7816714b6a69f920cfeea3d3d17c971ba4c6823_Sigmanly.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"3⤵PID:2760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension '.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension '.bat'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users\Victalis\Links'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:2000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5793c56b68060857e19833f659215179a
SHA12daea30fdb072ed77572ef5255095f649441c467
SHA256974c3b25c20b04c6c9c64e63c133b3263f275533bac599f56a4f60519f233716
SHA512508c792fbbe2207d008cebd370c96d223e3cef3cbd5e7a89e4bcfaf94b3d94772b1f4729291a7ae99e473304e7bd175fc549eb4891f4eedd78740ab982b72aea
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD511dd0f8240f27901fbdfdfd2ae96227d
SHA1a3671631a4cdf858b59c4f999cd028989ae2cb7b
SHA25644b187495e81a2e94467d8e6c8b02a296ca3b982570300968052168c0bfb9566
SHA51273d8d1be4eea8eb4af077eebb8d7d05c52f8df890669b18784fcd8b02622a65c26cd042b431ed7f0526752b84716af319a9cb6cd9936ccc61784fa4b2e5692d2