Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
Analysis ID:1528570
MD5:2aae6ec03b4990fbc20da8d70831e0a2
SHA1:da55c12e1c4ac252ee9dfce8ab23dd88ad8d2631
SHA256:2669f7c0e6bf5915e238467e772a50a802edaeecd124a004e835f636384ca781
Tags:exe
Infos:

Detection

DarkMe
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DarkMe
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeJoeSecurity_DarkMeYara detected DarkMeJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DarkMeYara detected DarkMeJoe Security
      00000000.00000000.2054057167.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_DarkMeYara detected DarkMeJoe Security
        Process Memory Space: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe PID: 6972JoeSecurity_DarkMeYara detected DarkMeJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpackJoeSecurity_DarkMeYara detected DarkMeJoe Security
            0.0.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpackJoeSecurity_DarkMeYara detected DarkMeJoe Security
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-08T02:22:05.895697+020020368351A Network Trojan was detected192.168.2.54970445.94.31.532022TCP
              2024-10-08T02:22:30.952583+020020368351A Network Trojan was detected192.168.2.54978345.94.31.532022TCP
              2024-10-08T02:22:56.002962+020020368351A Network Trojan was detected192.168.2.54982345.94.31.532022TCP
              2024-10-08T02:23:21.193663+020020368351A Network Trojan was detected192.168.2.54986645.94.31.532022TCP
              2024-10-08T02:23:46.227606+020020368351A Network Trojan was detected192.168.2.54986745.94.31.532022TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeAvira: detected
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeReversingLabs: Detection: 76%
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeVirustotal: Detection: 82%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.2% probability
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeJoe Sandbox ML: detected
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036835 - Severity 1 - ET MALWARE Win32/Darkme Trojan Checkin M1 : 192.168.2.5:49704 -> 45.94.31.53:2022
              Source: Network trafficSuricata IDS: 2036835 - Severity 1 - ET MALWARE Win32/Darkme Trojan Checkin M1 : 192.168.2.5:49783 -> 45.94.31.53:2022
              Source: Network trafficSuricata IDS: 2036835 - Severity 1 - ET MALWARE Win32/Darkme Trojan Checkin M1 : 192.168.2.5:49823 -> 45.94.31.53:2022
              Source: Network trafficSuricata IDS: 2036835 - Severity 1 - ET MALWARE Win32/Darkme Trojan Checkin M1 : 192.168.2.5:49867 -> 45.94.31.53:2022
              Source: Network trafficSuricata IDS: 2036835 - Severity 1 - ET MALWARE Win32/Darkme Trojan Checkin M1 : 192.168.2.5:49866 -> 45.94.31.53:2022
              Source: global trafficTCP traffic: 192.168.2.5:49704 -> 45.94.31.53:2022
              Source: Joe Sandbox ViewASN Name: GBTCLOUDUS GBTCLOUDUS
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: russia978.sytes.net
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004061690_2_00406169
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004042400_2_00404240
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004063D70_2_004063D7
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000000.2054083079.0000000000416000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename656.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"?> vs SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeBinary or memory string: OriginalFilename656.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"?> vs SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal80.troj.winEXE@1/0@2/1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeMutant created: NULL
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeReversingLabs: Detection: 76%
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeVirustotal: Detection: 82%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: msvbvm60.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: vb6zz.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: vb6es.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: vb6es.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeStatic PE information: real checksum: 0x1e602 should be: 0x23b8c
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00406169 push 00000007h; retf 0_2_004063D6
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403042 push 00401246h; ret 0_2_00403055
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403444 push 00401246h; ret 0_2_00403457
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405C48 push 00401246h; ret 0_2_00405C5B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403056 push 00401246h; ret 0_2_00403069
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403458 push 00401246h; ret 0_2_0040346B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405C5C push 00401246h; ret 0_2_00405C6F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_0040346C push 00401246h; ret 0_2_0040347F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405C70 push 00401246h; ret 0_2_00405C83
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_0040387C push 00401246h; ret 0_2_0040388F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403006 push 00401246h; ret 0_2_00403019
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_0040301A push 00401246h; ret 0_2_0040302D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_0040341C push 00401246h; ret 0_2_0040342F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_0040302E push 00401246h; ret 0_2_00403041
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403430 push 00401246h; ret 0_2_00403443
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405CC0 push 00401246h; ret 0_2_00405CD3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004038CC push 00401246h; ret 0_2_004038DF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405CD4 push 00401246h; ret 0_2_00405CE7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004038E0 push 00401246h; ret 0_2_004038F3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405CE8 push 00401246h; ret 0_2_00405CFB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004038F4 push 00401246h; ret 0_2_00403907
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405CFC push 00401246h; ret 0_2_00405D0F
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403480 push 00401246h; ret 0_2_00403493
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405C84 push 00401246h; ret 0_2_00405C97
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403890 push 00401246h; ret 0_2_004038A3
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00403494 push 00401246h; ret 0_2_004034A7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405C98 push 00401246h; ret 0_2_00405CAB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004038A4 push 00401246h; ret 0_2_004038B7
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004034A8 push 00401246h; ret 0_2_004034BB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_00405CAC push 00401246h; ret 0_2_00405CBF
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeCode function: 0_2_004038B8 push 00401246h; ret 0_2_004038CB
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.00000000004DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.0000000000503000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager) C
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.0000000000503000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerComSpe
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 123Program Manager
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.00000000004DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerO_
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernfo&
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.0000000000503000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager kp
              Source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.0000000000503000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.00000000004C3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319410627.0000000000514000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319476741.000000000050E000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000002.3307902467.0000000000522000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.00000000004DE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, 00000000.00000003.2319426906.000000000050D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter : Select * from AntiVirusProduct
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2054057167.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe PID: 6972, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.2054057167.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe PID: 6972, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Process Injection
              1
              Process Injection
              OS Credential Dumping21
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              DLL Side-Loading
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Obfuscated Files or Information
              Security Account Manager1
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe76%ReversingLabsWin32.Trojan.Multiverze
              SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe82%VirustotalBrowse
              SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe100%AviraTR/Dropper.Gen
              SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              russia978.sytes.net0%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              russia978.sytes.net
              45.94.31.53
              truetrueunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.94.31.53
              russia978.sytes.netNetherlands
              395800GBTCLOUDUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1528570
              Start date and time:2024-10-08 02:21:07 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 51s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:4
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
              Detection:MAL
              Classification:mal80.troj.winEXE@1/0@2/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, 7.4.8.4.4.3.1.4.0.0.0.0.0.0.0.0.0.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              20:21:59API Interceptor4763x Sleep call for process: SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              GBTCLOUDUSIV2tBGzAOn.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              17NhHArVe7.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              AzRiLxCGXJ.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              Cr8Dw4Ybgh.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              6NTauFuNV1.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              boatnet.arm.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              boatnet.arm7.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              boatnet.x86.elfGet hashmaliciousMiraiBrowse
              • 37.221.93.146
              PO#001498.exeGet hashmaliciousFormBookBrowse
              • 154.9.228.56
              CpUXaHHdPB.exeGet hashmaliciousXWormBrowse
              • 45.94.31.88
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):4.650051031976191
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.15%
              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
              File size:86'016 bytes
              MD5:2aae6ec03b4990fbc20da8d70831e0a2
              SHA1:da55c12e1c4ac252ee9dfce8ab23dd88ad8d2631
              SHA256:2669f7c0e6bf5915e238467e772a50a802edaeecd124a004e835f636384ca781
              SHA512:fd8855137680cb0e0c72df92db8698c9f582a7c31ff8a44691bfedde3f4895bc1271261714e6784944643086dc25b3f9c9b3afaea934599c5cc65b451cf1ae19
              SSDEEP:768:P0cBEDl8mtcoRPO+YuX1Ayf3EgkOqwLevxPIcvAkM8/eVnpc89dPdtWW96D//TRI:P0a0PO/Ujf3OnwevbVfo9dPdb96r/ZmB
              TLSH:EA83182FF79149E1E6461A310AB5C2E96773BCA66FC7821F7640322D1C36EA20C4576F
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............i...i...i...d...i.Rich..i.................PE..L.....ob.................0...................@....@........................
              Icon Hash:00869eb0b230201f
              Entrypoint:0x4012c4
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:
              Time Stamp:0x626F048F [Sun May 1 22:07:11 2022 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:3e847ec4ad926dd89c2f4cb28d036c11
              Instruction
              push 00401AE4h
              call 00007F34047F6C25h
              add byte ptr [eax], al
              dec eax
              add byte ptr [eax], al
              add byte ptr [eax], dh
              add byte ptr [eax], al
              add byte ptr [eax+00h], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              jl 00007F34047F6BC4h
              mov dword ptr [1984C9B5h], eax
              inc esp
              lodsb
              jmp 00007F34047F6C0Eh
              jmp 00007F34047F6C97h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x12e140x28.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000xbb0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2200x20
              IMAGE_DIRECTORY_ENTRY_IAT0x10000x11c.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x120580x13000281f248310b16e0a17d0d9cb1b8d7a51False0.3662366365131579data4.77406274711687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x140000x1f2c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x160000xbb00x1000a205b2048d40c35413e9b4f70e675f71False0.250244140625data4.332652948767866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              CUSTOM0x162600x13ASCII text, with no line terminators1.4210526315789473
              CUSTOM0x162740x4ASCII text, with no line terminators3.0
              CUSTOM0x162780x3ASCII text, with no line terminators3.6666666666666665
              RT_ICON0x1627c0x130Device independent bitmap graphic, 32 x 64 x 1, image size 2560.3223684210526316
              RT_ICON0x163ac0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.19623655913978494
              RT_ICON0x166940x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.4155405405405405
              RT_GROUP_ICON0x167bc0x30data1.0
              RT_VERSION0x167ec0x1ccdata0.5108695652173914
              RT_MANIFEST0x169b80x1f6XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.49203187250996017
              DLLImport
              MSVBVM60.DLLEVENT_SINK_GetIDsOfNames, MethCallEngine, EVENT_SINK_Invoke, Zombie_GetTypeInfo, EVENT_SINK_AddRef, DllFunctionCall, Zombie_GetTypeInfoCount, EVENT_SINK_Release, EVENT_SINK_QueryInterface, __vbaExceptHandler, ProcCallEngine
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-08T02:22:05.895697+02002036835ET MALWARE Win32/Darkme Trojan Checkin M11192.168.2.54970445.94.31.532022TCP
              2024-10-08T02:22:30.952583+02002036835ET MALWARE Win32/Darkme Trojan Checkin M11192.168.2.54978345.94.31.532022TCP
              2024-10-08T02:22:56.002962+02002036835ET MALWARE Win32/Darkme Trojan Checkin M11192.168.2.54982345.94.31.532022TCP
              2024-10-08T02:23:21.193663+02002036835ET MALWARE Win32/Darkme Trojan Checkin M11192.168.2.54986645.94.31.532022TCP
              2024-10-08T02:23:46.227606+02002036835ET MALWARE Win32/Darkme Trojan Checkin M11192.168.2.54986745.94.31.532022TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 8, 2024 02:22:05.827970028 CEST497042022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:05.832930088 CEST20224970445.94.31.53192.168.2.5
              Oct 8, 2024 02:22:05.833034992 CEST497042022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:05.895697117 CEST497042022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:05.901369095 CEST20224970445.94.31.53192.168.2.5
              Oct 8, 2024 02:22:27.271301031 CEST20224970445.94.31.53192.168.2.5
              Oct 8, 2024 02:22:27.271368980 CEST497042022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:27.271524906 CEST497042022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:27.276376963 CEST20224970445.94.31.53192.168.2.5
              Oct 8, 2024 02:22:30.922408104 CEST497832022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:30.927473068 CEST20224978345.94.31.53192.168.2.5
              Oct 8, 2024 02:22:30.927612066 CEST497832022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:30.952583075 CEST497832022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:30.957396984 CEST20224978345.94.31.53192.168.2.5
              Oct 8, 2024 02:22:52.303137064 CEST20224978345.94.31.53192.168.2.5
              Oct 8, 2024 02:22:52.303375006 CEST497832022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:52.303530931 CEST497832022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:52.308248997 CEST20224978345.94.31.53192.168.2.5
              Oct 8, 2024 02:22:55.968503952 CEST498232022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:55.973372936 CEST20224982345.94.31.53192.168.2.5
              Oct 8, 2024 02:22:55.973496914 CEST498232022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:56.002962112 CEST498232022192.168.2.545.94.31.53
              Oct 8, 2024 02:22:56.007731915 CEST20224982345.94.31.53192.168.2.5
              Oct 8, 2024 02:23:17.355110884 CEST20224982345.94.31.53192.168.2.5
              Oct 8, 2024 02:23:17.355334997 CEST498232022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:17.355335951 CEST498232022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:17.360234022 CEST20224982345.94.31.53192.168.2.5
              Oct 8, 2024 02:23:21.072177887 CEST498662022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:21.077019930 CEST20224986645.94.31.53192.168.2.5
              Oct 8, 2024 02:23:21.077109098 CEST498662022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:21.193662882 CEST498662022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:21.198779106 CEST20224986645.94.31.53192.168.2.5
              Oct 8, 2024 02:23:42.455765009 CEST20224986645.94.31.53192.168.2.5
              Oct 8, 2024 02:23:42.456058979 CEST498662022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:42.456058979 CEST498662022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:42.461103916 CEST20224986645.94.31.53192.168.2.5
              Oct 8, 2024 02:23:46.199889898 CEST498672022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:46.204956055 CEST20224986745.94.31.53192.168.2.5
              Oct 8, 2024 02:23:46.205076933 CEST498672022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:46.227606058 CEST498672022192.168.2.545.94.31.53
              Oct 8, 2024 02:23:46.232777119 CEST20224986745.94.31.53192.168.2.5
              Oct 8, 2024 02:24:07.600193977 CEST20224986745.94.31.53192.168.2.5
              Oct 8, 2024 02:24:07.600405931 CEST498672022192.168.2.545.94.31.53
              TimestampSource PortDest PortSource IPDest IP
              Oct 8, 2024 02:22:05.812495947 CEST5687753192.168.2.51.1.1.1
              Oct 8, 2024 02:22:05.821046114 CEST53568771.1.1.1192.168.2.5
              Oct 8, 2024 02:22:45.352611065 CEST5360083162.159.36.2192.168.2.5
              Oct 8, 2024 02:22:46.051238060 CEST53538351.1.1.1192.168.2.5
              Oct 8, 2024 02:23:21.061270952 CEST5467753192.168.2.51.1.1.1
              Oct 8, 2024 02:23:21.070148945 CEST53546771.1.1.1192.168.2.5
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 8, 2024 02:22:05.812495947 CEST192.168.2.51.1.1.10x5c90Standard query (0)russia978.sytes.netA (IP address)IN (0x0001)false
              Oct 8, 2024 02:23:21.061270952 CEST192.168.2.51.1.1.10x6c4Standard query (0)russia978.sytes.netA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 8, 2024 02:22:05.821046114 CEST1.1.1.1192.168.2.50x5c90No error (0)russia978.sytes.net45.94.31.53A (IP address)IN (0x0001)false
              Oct 8, 2024 02:23:21.070148945 CEST1.1.1.1192.168.2.50x6c4No error (0)russia978.sytes.net45.94.31.53A (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:20:21:59
              Start date:07/10/2024
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Siggen28.43392.25240.5571.exe"
              Imagebase:0x400000
              File size:86'016 bytes
              MD5 hash:2AAE6EC03B4990FBC20DA8D70831E0A2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DarkMe, Description: Yara detected DarkMe, Source: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DarkMe, Description: Yara detected DarkMe, Source: 00000000.00000000.2054057167.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Reset < >

                Execution Graph

                Execution Coverage:4.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:4
                Total number of Limit Nodes:1
                execution_graph 750 4012c4 751 4012c7 #100 750->751 752 4012e2 751->752 753 401274 #308 751->753 752->751 753->750
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.3307734562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307796395.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307813666.0000000000416000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: $g@$HA$|f@$|f@
                • API String ID: 0-3543863206
                • Opcode ID: 6a6b14718818b5dddd7ff72c8c61edfea650d5ea229bac93a4ec7911c67a38f8
                • Instruction ID: fb8b5301ce807253b714995e0700c4edd3551c0aa2f57c66e5814f15ea9bee59
                • Opcode Fuzzy Hash: 6a6b14718818b5dddd7ff72c8c61edfea650d5ea229bac93a4ec7911c67a38f8
                • Instruction Fuzzy Hash: 0922426004E3C05FD7178B745D6A5963FB0AE03204B1B44EBD882EF1F3D26D996AC76A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 179 4012c4 180 4012c7-4012e0 #100 179->180 181 4012e2-4012e9 180->181 182 401274-40127c #308 180->182 181->180 182->179
                APIs
                • #100.MSVBVM60(VB5!6&VB6ES.DLL), ref: 004012C9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.3307734562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307796395.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307813666.0000000000416000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID: #100
                • String ID: VB5!6&VB6ES.DLL
                • API String ID: 1341478452-1434749051
                • Opcode ID: 2c779be0c884e5448fe18097169dc83a83a8fe5300dd20a87c125446790657a5
                • Instruction ID: dd026026d34b38e6a4ed7aad05ddaa59880ee43e65303cc35a76a7c4acc26a4b
                • Opcode Fuzzy Hash: 2c779be0c884e5448fe18097169dc83a83a8fe5300dd20a87c125446790657a5
                • Instruction Fuzzy Hash: 0AE09952A4E3C19FC70317A048A59803FB4981739130A41EB84C6EA0F3D26C088AC72A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 183 404240-4059b4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.3307734562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307796395.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307813666.0000000000416000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: 4
                • API String ID: 0-4088798008
                • Opcode ID: 9afebb9aeaa31ff0bf1e735df4ef639358a6a9bfd353b16a301e2c01d213f402
                • Instruction ID: a50c9e4f59e28a0ff66013c90dcc5576421e980b19b108ec53bb06552cf7f973
                • Opcode Fuzzy Hash: 9afebb9aeaa31ff0bf1e735df4ef639358a6a9bfd353b16a301e2c01d213f402
                • Instruction Fuzzy Hash: E3626A5158E7D25FC3174BB418B95A0BFB0AD0712A32E91DBC1E6CE4A3D28D849BC763
                Memory Dump Source
                • Source File: 00000000.00000002.3307761066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                • Associated: 00000000.00000002.3307734562.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307796395.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.3307813666.0000000000416000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a71f38f796dedf2284a97dd22274a84299b011fd68e8c97a49a062e0ed4c016
                • Instruction ID: 882a3372ff278864a02619dcc1f0f9b16a106b58d7367eb0733fc2ed8076507d
                • Opcode Fuzzy Hash: 1a71f38f796dedf2284a97dd22274a84299b011fd68e8c97a49a062e0ed4c016
                • Instruction Fuzzy Hash: C191896004E3D06FCB178B349D6649A7FB49E43304B1A04EBD882AF1F3D12D5929C76B