Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
Analysis ID:1467825
MD5:72762b7ac7c6dfdc7b1c3b3a5171103a
SHA1:1ff4eb16282c076fbe98c589ba0218a1b39672be
SHA256:ecc5a64d97d4adb41ed9332e4c0f5dc7dc02a64a77817438d27fc31c69f7c1d3
Tags:exe
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Detected TCP or UDP traffic on non-standard ports
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeAvira: detected
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 211.108.74.247:5555
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: xmr.330com.com
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe, 00000000.00000000.1653268270.00007FF6617F1000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOffice.exe. vs SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeBinary or memory string: OriginalFilenameOffice.exe. vs SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
Source: classification engineClassification label: mal68.evad.winEXE@2/1@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Win__Host
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3332:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeStatic file information: File size 1648640 > 1048576
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x191c00
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe, 00000000.00000002.4102487981.00000294E3C65000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: conhost.exe, 00000001.00000002.4102830439.00000256E5270000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: conhost.exe, 00000001.00000002.4102830439.00000256E5270000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: conhost.exe, 00000001.00000002.4102830439.00000256E5270000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: conhost.exe, 00000001.00000002.4102830439.00000256E5270000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
2
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe68%ReversingLabsWin64.Trojan.DumpDacicBitCoinMiner
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe100%AviraHEUR/AGEN.1313076
SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
xmr.330com.com
117.52.82.171
truefalse
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    211.108.74.247
    unknownKorea Republic of
    9318SKB-ASSKBroadbandCoLtdKRfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1467825
    Start date and time:2024-07-04 20:39:07 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 55s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
    Detection:MAL
    Classification:mal68.evad.winEXE@2/1@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    xmr.330com.compRTafycKx1.exeGet hashmaliciousETERNALBLUEBrowse
    • 211.108.74.249
    pRTafycKx1.exeGet hashmaliciousETERNALBLUEBrowse
    • 62.48.34.99
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    SKB-ASSKBroadbandCoLtdKRXeKVjhBWhU.elfGet hashmaliciousUnknownBrowse
    • 58.122.54.37
    205.185.124.50-mips-2024-07-03T23_47_54.elfGet hashmaliciousMirai, MoobotBrowse
    • 58.225.223.199
    qS7rA9kvqg.elfGet hashmaliciousUnknownBrowse
    • 39.115.80.108
    buPdHWwrzF.elfGet hashmaliciousUnknownBrowse
    • 211.186.246.58
    ztGOiA742S.elfGet hashmaliciousUnknownBrowse
    • 58.228.29.62
    er8xK60DM8.elfGet hashmaliciousUnknownBrowse
    • 175.122.18.2
    d54Y7Ql8sO.elfGet hashmaliciousUnknownBrowse
    • 123.111.62.174
    nNNceyj62M.elfGet hashmaliciousUnknownBrowse
    • 211.52.224.107
    5No3fHe5eO.elfGet hashmaliciousMiraiBrowse
    • 110.12.63.38
    VXBKak29Dz.elfGet hashmaliciousMiraiBrowse
    • 221.141.178.95
    No context
    No context
    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
    File Type:ASCII text, with CRLF, CR line terminators
    Category:dropped
    Size (bytes):236
    Entropy (8bit):4.970687775759423
    Encrypted:false
    SSDEEP:6:o9ZnpCwvG25zZv03CwyTSZv0kt4CwZUTSZvn:oBtAty3tZh
    MD5:F2B977239FCD774A15E4F1BAFFD7C6BC
    SHA1:D55DBC15D767480FAF664A9A4AFF8BD6ACD54F62
    SHA-256:3B503438773D30620E8F8E05844C7A22FD647E3D9832FEDC2AFD703BA0B41243
    SHA-512:74F64529C38C6F3E4982C8B0298F4C66B3D0F6274278FB7F204CB3799D57AED4351B9FC5BD0D345C1D2629E289DA00E3BFF937130A24E313FD2BF9683E18EACB
    Malicious:false
    Reputation:low
    Preview:[2024-07-04 16:03:45.067] unable to open "C:\Users\user\Desktop\config.json"....[2024-07-04 16:03:45.069] unable to open "C:\Users\user\.Office.json"....[2024-07-04 16:03:45.072] unable to open "C:\Users\user\.config\Office.json"....
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):7.9366972422071305
    TrID:
    • Win64 Executable Console (202006/5) 81.26%
    • UPX compressed Win32 Executable (30571/9) 12.30%
    • Win64 Executable (generic) (12005/4) 4.83%
    • Generic Win/DOS Executable (2004/3) 0.81%
    • DOS Executable Generic (2002/1) 0.81%
    File name:SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
    File size:1'648'640 bytes
    MD5:72762b7ac7c6dfdc7b1c3b3a5171103a
    SHA1:1ff4eb16282c076fbe98c589ba0218a1b39672be
    SHA256:ecc5a64d97d4adb41ed9332e4c0f5dc7dc02a64a77817438d27fc31c69f7c1d3
    SHA512:a8f281da8160a62cf5f07273cc5c3c62dc8aa0aa33f75abd22e9d49b366a63c214274bd1b7140a1c4773584a451a2b54722991880999386d6924932953a6de14
    SSDEEP:49152:TgCwUI2zMCsThgKx7epXo6Ekk6Jy63g9iugMN51fP:Tg9msFgs6u6rk2FgYugMr
    TLSH:5B75337282760C12DB4A167D72020EC6A52CF1223DFB36F5A79CF925D73C9A0491B6DB
    File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$........*.d.K.7.K.7.K.7. .6.K.7. .6&K.7.$+7.K.7.?.6.K.7.?.6.K.7.?.6.K.7. .6.K.77?.6.K.7. .6.K.7.K.7.J.7T>.6.I.77?.6HK.77?.6.K.77?)7.K.
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x1406d0750
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x6347C2B8 [Thu Oct 13 07:48:08 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:d42b2c3f8eae481e901bdd791980197f
    Instruction
    push ebx
    push esi
    push edi
    push ebp
    dec eax
    lea esi, dword ptr [FFE6E8A5h]
    dec eax
    lea edi, dword ptr [esi-0053E000h]
    dec eax
    lea eax, dword ptr [edi+006928C4h]
    push dword ptr [eax]
    mov dword ptr [eax], 7A320B7Eh
    push eax
    push edi
    xor ebx, ebx
    xor ecx, ecx
    dec eax
    or ebp, FFFFFFFFh
    call 00007F5C99017C55h
    add ebx, ebx
    je 00007F5C99017C04h
    rep ret
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    rep ret
    dec eax
    lea eax, dword ptr [edi+ebp]
    cmp ecx, 05h
    mov dl, byte ptr [eax]
    jbe 00007F5C99017C23h
    dec eax
    cmp ebp, FFFFFFFCh
    jnbe 00007F5C99017C1Dh
    sub ecx, 04h
    mov edx, dword ptr [eax]
    dec eax
    add eax, 04h
    sub ecx, 04h
    mov dword ptr [edi], edx
    dec eax
    lea edi, dword ptr [edi+04h]
    jnc 00007F5C99017BF1h
    add ecx, 04h
    mov dl, byte ptr [eax]
    je 00007F5C99017C12h
    dec eax
    inc eax
    mov byte ptr [edi], dl
    sub ecx, 01h
    mov dl, byte ptr [eax]
    dec eax
    lea edi, dword ptr [edi+01h]
    jne 00007F5C99017BF2h
    rep ret
    cld
    inc ecx
    pop ebx
    jmp 00007F5C99017C0Ah
    dec eax
    inc esi
    mov byte ptr [edi], dl
    dec eax
    inc edi
    mov dl, byte ptr [esi]
    add ebx, ebx
    jne 00007F5C99017C0Ch
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    jc 00007F5C99017BE8h
    lea eax, dword ptr [ecx+01h]
    jmp 00007F5C99017C09h
    dec eax
    inc ecx
    call ebx
    adc eax, eax
    inc ecx
    call ebx
    adc eax, eax
    add ebx, ebx
    jne 00007F5C99017C0Ch
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    jnc 00007F5C99017BE6h
    sub eax, 03h
    jc 00007F5C99017C1Bh
    shl eax, 08h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x6d14d80x24c.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d10000x4d8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x69e0000x1bfe4UPX1
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d17240x1c.rsrc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x6d09e80x28UPX1
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d0a1c0x138UPX1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000x53e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x53f0000x1920000x191c00805299ec6fe4e5fed13cbf2248ba4c58False0.9799534264156814data7.937914087606462IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x6d10000x10000x800c22c033f6159e28fd08857ba55ff803bFalse0.43505859375data4.074976885581533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x6d10a40x2b0dataEnglishUnited States0.46511627906976744
    RT_MANIFEST0x6d13580x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    ADVAPI32.dllLsaClose
    bcrypt.dllBCryptGenRandom
    CRYPT32.dllCertOpenStore
    KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
    ole32.dllCoInitializeEx
    USER32.dllShowWindow
    USERENV.dllGetUserProfileDirectoryW
    WS2_32.dllioctlsocket
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Jul 4, 2024 20:39:57.377053022 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:39:57.381973028 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:57.382071972 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:39:57.382390022 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:39:57.387383938 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:58.270885944 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:58.271851063 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:39:58.276770115 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:58.564555883 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:58.617801905 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:39:58.704577923 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:39:58.758445978 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:40:06.060326099 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:40:06.105334997 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:40:28.085005999 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:40:28.149084091 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:40:48.954504967 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:40:49.039882898 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:41:09.747906923 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:41:09.852260113 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:41:20.158843994 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:41:20.352277994 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:41:41.913408995 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:41:42.039825916 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:42:03.630662918 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:42:03.836777925 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:42:19.203286886 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:42:19.352324963 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:42:39.979288101 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:42:40.039967060 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:43:01.960724115 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:43:02.039917946 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:43:24.236141920 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:43:24.352428913 CEST497305555192.168.2.4211.108.74.247
    Jul 4, 2024 20:43:45.810548067 CEST555549730211.108.74.247192.168.2.4
    Jul 4, 2024 20:43:45.855245113 CEST497305555192.168.2.4211.108.74.247
    TimestampSource PortDest PortSource IPDest IP
    Jul 4, 2024 20:39:57.355230093 CEST5316453192.168.2.41.1.1.1
    Jul 4, 2024 20:39:57.373244047 CEST53531641.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jul 4, 2024 20:39:57.355230093 CEST192.168.2.41.1.1.10xf3cStandard query (0)xmr.330com.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jul 4, 2024 20:39:57.373244047 CEST1.1.1.1192.168.2.40xf3cNo error (0)xmr.330com.com117.52.82.171A (IP address)IN (0x0001)false
    Jul 4, 2024 20:39:57.373244047 CEST1.1.1.1192.168.2.40xf3cNo error (0)xmr.330com.com62.48.34.99A (IP address)IN (0x0001)false
    Jul 4, 2024 20:39:57.373244047 CEST1.1.1.1192.168.2.40xf3cNo error (0)xmr.330com.com211.108.74.247A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:14:39:56
    Start date:04/07/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen26.13253.13951.8155.exe"
    Imagebase:0x7ff661120000
    File size:1'648'640 bytes
    MD5 hash:72762B7AC7C6DFDC7B1C3B3A5171103A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:14:39:56
    Start date:04/07/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly