File name:

SecuriteInfo.com.Trojan.Siggen.18256.26900.26739

Full analysis: https://app.any.run/tasks/a2b973b3-1165-4864-9e34-f19e0809eb23
Verdict: Malicious activity
Analysis date: October 25, 2023, 18:34:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7E5D06846F4F1BAB66CB8C4A225441E7

SHA1:

837F0D5374222C50A3233DAA9F3AC90DA9C98CA5

SHA256:

C98767C0A51B0CA83D1708BEB89F03296394F11F4FD17FC93F3B6D6FBF1686A9

SSDEEP:

768:4HolOaMO1P7O4w/gxHlAqiU4XtJv+LakJQsg6t0rpjfKFtbwxj:4HolOaMO1P7O4w/YOquXHqakJh08Ftkp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Creates a writable file the system directory

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Drops the executable file immediately after the start

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Changes the login/logoff helper path in the registry

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Reads Microsoft Office registry keys

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Reads the computer name

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Create files in a temporary directory

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
    • Creates files or folders in the user directory

      • SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe (PID: 2612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1970:09:23 20:12:18+01:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.55
CodeSize: 57344
InitializedDataSize: 4096
UninitializedDataSize: 4096
EntryPoint: 0xa49b
OSVersion: 1
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.trojan.siggen.18256.26900.26739.exe winword.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1848"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -EmbeddingC:\Program Files\Microsoft Office\Office14\WINWORD.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.5123.5000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_08e61857a83bc251\msvcr90.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_a4d981ff711297b6\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2612"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.trojan.siggen.18256.26900.26739.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\wow64win.dll
2948svchost.exeC:\Windows\SysWOW64\svchost.exe
SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
1 372
Read events
1 340
Write events
25
Delete events
7

Modification events

(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
On
(PID) Process:(1848) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
On
Executable files
1
Suspicious files
3
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1848WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRBADF.tmp.cvr
MD5:
SHA256:
1848WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{CE26DF33-7336-465A-92D1-D49442F6DCA1}.tmpbinary
MD5:F6E73E090FD2BF4D03924C24DDF30841
SHA256:B28CCECE55C779F9E9E09B0F312337F53E027EF5B6E5A17194EF85E2C7D16053
1848WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5DDAEE0C-DE9D-4A24-9653-44A3EA2A7F83}.tmpbinary
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
2612SecuriteInfo.com.Trojan.Siggen.18256.26900.26739.exeC:\Users\admin\AppData\Local\VirtualStore\Windows\SysWOW64\ifmq.kqoexecutable
MD5:9A4F14186C8D81E93992D73A5E853264
SHA256:8D349F80A7FE480D111F9DDA406FE2E02CA6A0081157D24E53746CC00475C741
1848WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\Word14.customUIcompressed
MD5:6469882B26DA23C8A9FC242BC28915B6
SHA256:9654CBA5031E04D62507C660ED62ABE5433B472EF2A46C8FCDA7E19E064E9156
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
unknown
324
svchost.exe
224.0.0.252:5355
unknown
2948
svchost.exe
193.104.27.91:80
MTS PJSC
RU
unknown

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info