Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 16:35
Behavioral task
behavioral1
Sample
Sigmaalpha.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Sigmaalpha.exe
Resource
win10v2004-20241007-en
General
-
Target
Sigmaalpha.exe
-
Size
839KB
-
MD5
6f93bf5bd25cf58c2756121371d1bb3f
-
SHA1
d7fdff4e6c355add9a58bf54d66d420c97f8a9a9
-
SHA256
676fdc85814c991074766a302aca8f6ffbd3e35f6564b841cb712010ccd8d816
-
SHA512
2def16daf5c7bfe838d4a9438554df2d07fd8d93c0d090e0d099b95a19e9f8b2aba3b810f845a4b90640856d6db0343c0335ef5eb288dc62ed4f22f806678e8e
-
SSDEEP
24576:mBS04YNEMuExDiU6E5R9s8xY/2l/dGtnIbt+rn:mj4auS+UjfU2TGdIbt+r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Sigmaalpha.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 AudioDriver.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Sigmaalpha.exe File opened for modification C:\Windows\assembly\Desktop.ini Sigmaalpha.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Sigmaalpha.exe File opened for modification C:\Windows\assembly\Desktop.ini Sigmaalpha.exe File opened for modification C:\Windows\assembly Sigmaalpha.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sigmaalpha.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioDriver.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe 1148 AudioDriver.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 AudioDriver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1148 AudioDriver.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1148 AudioDriver.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1148 4944 Sigmaalpha.exe 83 PID 4944 wrote to memory of 1148 4944 Sigmaalpha.exe 83 PID 4944 wrote to memory of 1148 4944 Sigmaalpha.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sigmaalpha.exe"C:\Users\Admin\AppData\Local\Temp\Sigmaalpha.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
839KB
MD56f93bf5bd25cf58c2756121371d1bb3f
SHA1d7fdff4e6c355add9a58bf54d66d420c97f8a9a9
SHA256676fdc85814c991074766a302aca8f6ffbd3e35f6564b841cb712010ccd8d816
SHA5122def16daf5c7bfe838d4a9438554df2d07fd8d93c0d090e0d099b95a19e9f8b2aba3b810f845a4b90640856d6db0343c0335ef5eb288dc62ed4f22f806678e8e