analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817

Full analysis: https://app.any.run/tasks/d3329b0b-08e1-4c92-8380-7352aaa1fb8b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 05, 2022, 22:35:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
stealer
vidar
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8B2AF24DE5814668562CC1F27FD26AD0

SHA1:

CBE6CF1F151CE5E7D24BD0F773A229A447B9A658

SHA256:

B7BBAC182F944D86B63F6A3BA9AFE9C62A8195A8977C64802BEA8042D6173186

SSDEEP:

6144:BIgiW1iFeUL95LRcUoSSwu5To90jz38UkxHCbXs1is+Yx/iRsUSGiV6GP:B4FZhcUoSSwu5To90UUkBCbXs1i7YxKN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • VIDAR was detected

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Loads dropped or rewritten executable

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
  • SUSPICIOUS

    • Reads the Internet Settings

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Checks Windows Trust Settings

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads settings of System Certificates

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads browser cookies

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Connects to the server without a host name

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Starts CMD.EXE for self-deleting

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Searches for installed software

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Starts CMD.EXE for commands execution

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
  • INFO

    • Reads the computer name

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Checks supported languages

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Checks proxy server information

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads Environment values

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads CPU info

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads product name

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Creates files in the program directory

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
    • Reads the CPU's name

      • SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe (PID: 2988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2022-Dec-01 17:02:00

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 240

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 4
TimeDateStamp: 2022-Dec-01 17:02:00
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
4096
210931
210944
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.5623
.rdata
217088
59044
59392
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.65014
.data
278528
86372
7168
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.94119
.reloc
368640
19454
19456
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.15413

Imports

KERNEL32.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #VIDAR securiteinfo.com.trojan.pws.siggen3.24840.25430.18817.exe cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2988"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.trojan.pws.siggen3.24840.25430.18817.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
1572"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe" & exitC:\Windows\System32\cmd.exeSecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3124timeout /t 6 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
5 599
Read events
5 565
Write events
34
Delete events
0

Modification events

(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2988) SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{362E934C-743B-4588-8259-D2482DB771A8}
Operation:writeName:WpadDecisionReason
Value:
1
Executable files
6
Suspicious files
7
Text files
1
Unknown types
11

Dropped files

PID
Process
Filename
Type
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\ProgramData\85672165494990711741505723
MD5:
SHA256:
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dder
MD5:54D389C97E4B56C4FD5F7FD2EE75CAD8
SHA256:805A905D72FAE55AAC2B424472B641568599C61294507C608B0523BCAB10FBBD
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:EC7E49A1DEB2A74822546C4EADEE5C94
SHA256:27E9B87F9CB42CC6725309E14290EB33B836E64968FC40C8ACDFB5689AE6FA77
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771der
MD5:E564CAB61E382406F4D7E9EBDCA3F2CA
SHA256:9B67206021B63E35A55FE2B95B9263FD514099F4E4BD0E3FEF0F4A33D1C69028
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771binary
MD5:77C8C3C38335D77610089E7056395431
SHA256:CF0ABE42BE787E996F4912F4BEFC266AE64F81E5241EAE486CE126C89B32F336
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\IQY6JSMM.txttext
MD5:B925F4ACC4925C6C2E2A389E52EE7E66
SHA256:700D48D14DE41FDBDF03196946846F107E05AFF93FB7165D3241531395F10C9F
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30binary
MD5:BB4DD2D0B6F0B896F79FCE21CD8400B3
SHA256:01E9D79A5513D107B65BE104B9097C650077D082BD694EAA5B994D6CF6AECD5C
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dbinary
MD5:AB1263F2DEF7F8D2FD12FFC9FF6CF527
SHA256:4602F62FA7C9394B0114F6573CDCC5ABA12A3257CAF9301F79FA9D14E7A98CC0
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30der
MD5:E4FD10C588A13A7F8482D95E13DE3B15
SHA256:C0D03C7EC2A9782ACFAC7D0C31249475FAEB8AEC71970DDC2CBE1734EC01B80F
2988SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
US
der
1.69 Kb
whitelisted
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
168.119.167.188:80
http://168.119.167.188/141540637804.zip
DE
compressed
3.47 Mb
malicious
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
168.119.167.188:80
http://168.119.167.188/1672
DE
text
109 b
malicious
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
US
der
1.66 Kb
whitelisted
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEowSDBGMEQwQjAJBgUrDgMCGgUABBS2CA1fbGt26xPkOKX4ZguoUjM0TgQUQMK9J47MNIMwojPX%2B2yz8LQsgM4CCQCxJlJbiuuimg%3D%3D
US
der
1.74 Kb
whitelisted
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
POST
200
168.119.167.188:80
http://168.119.167.188/
DE
text
2 b
malicious
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?415878f6e1998b08
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
168.119.167.188:80
Hetzner Online GmbH
DE
malicious
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
192.124.249.41:80
ocsp.godaddy.com
SUCURI-SEC
US
suspicious
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
149.154.167.99:443
t.me
Telegram Messenger Inc
GB
malicious

DNS requests

Domain
IP
Reputation
t.me
  • 149.154.167.99
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.godaddy.com
  • 192.124.249.41
  • 192.124.249.22
  • 192.124.249.24
  • 192.124.249.23
  • 192.124.249.36
whitelisted

Threats

PID
Process
Class
Message
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
Potentially Bad Traffic
ET INFO Dotted Quad Host ZIP Request
2988
SecuriteInfo.com.Trojan.PWS.Siggen3.24840.25430.18817.exe
A Network Trojan was detected
ET TROJAN Arkei/Vidar/Mars Stealer Variant
2 ETPRO signatures available at the full report
No debug info