MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1a7d1373265847ad8469a5df8553ff02083382c92ea203647e47748c0d6d0344. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 1a7d1373265847ad8469a5df8553ff02083382c92ea203647e47748c0d6d0344
SHA3-384 hash: 6d09f9eedf8193b7558cdd08654aa0cb358a83bad3ada8c21b92e35e7e6c4c5c6712c95c161f9e31435857e915b8362a
SHA1 hash: 44eb4a0117916f5cf075ec46c870ab18e50bf25e
MD5 hash: 82aea891a685d4409ca9b2f9deee61bc
humanhash: moon-romeo-nine-undress
File name:SecuriteInfo.com.Trojan.Siggen23.41824.24705.31663
Download: download sample
File size:895'368 bytes
First seen:2024-06-10 03:17:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b34f154ec913d2d2c435cbd644e91687 (533 x GuLoader, 110 x RemcosRAT, 80 x EpsilonStealer)
ssdeep 24576:sSP3t9MRDu173tJHfG1szLSvJw8eAdEcEUz2:9YRK73t9fqvC8eKEhD
TLSH T12515121F5B78CA16C2FF5633C1A38E1B4BA59D20051084EF558CFBEE60E7953AA4D90E
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
File icon (PE):PE icon
dhash icon f08e333333338ef0
Reporter SecuriteInfoCom
Tags:exe signed

Code Signing Certificate

Organisation:ITPRODUCTDEV LTD
Issuer:GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Algorithm:sha256WithRSAEncryption
Valid from:2020-05-18T10:45:28Z
Valid to:2023-05-19T10:45:28Z
Serial number: 1355660840b5813ad3d93017
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: e6847c414cd9e374b8fccc822d9c72e210f9d691075c11cce72f4a2b84c02028
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
657
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1a7d1373265847ad8469a5df8553ff02083382c92ea203647e47748c0d6d0344.exe
Verdict:
Malicious activity
Analysis date:
2024-06-10 03:19:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
Encryption Execution Network Static Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a window
DNS request
Connection attempt
Sending an HTTP POST request
Creating a file
Sending an HTTP GET request
Moving a recently created file
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Searching for synchronization primitives
Launching a process
Moving a file to the %AppData% subdirectory
Changing a file
Enabling autorun with the shell\open\command registry branches
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
installer lolbin microsoft_visual_cc overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Piriform Ltd
Verdict:
Suspicious
Result
Threat name:
n/a
Detection:
suspicious
Classification:
spyw.evad
Score:
39 / 100
Signature
Installs new ROOT certificates
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1454371 Sample: SecuriteInfo.com.Trojan.Sig... Startdate: 10/06/2024 Architecture: WINDOWS Score: 39 73 desktop.televzr.com 2->73 75 cdn-televzr.com 2->75 7 Ummy.exe 3 101 2->7         started        9 SecuriteInfo.com.Trojan.Siggen23.41824.24705.31663.exe 42 152 2->9         started        process3 dnsIp4 13 cmd.exe 7->13         started        16 cmd.exe 7->16         started        18 cmd.exe 7->18         started        27 7 other processes 7->27 77 desktop.televzr.com 104.21.63.211, 49734, 80 CLOUDFLARENETUS United States 9->77 79 cdn-televzr.com 172.67.129.222, 49735, 80 CLOUDFLARENETUS United States 9->79 65 C:\Users\user\AppData\Local\ummy\Ummy.exe, PE32 9->65 dropped 67 C:\Users\user\AppData\Local\...\vulkan-1.dll, PE32 9->67 dropped 69 C:\Users\user\AppData\...\vk_swiftshader.dll, PE32 9->69 dropped 71 21 other files (none is malicious) 9->71 dropped 20 vcredist_x86.exe 77 9->20         started        23 cmd.exe 1 9->23         started        25 msiexec.exe 165 50 9->25         started        file5 process6 dnsIp7 30 conhost.exe 13->30         started        32 reg.exe 13->32         started        34 conhost.exe 16->34         started        36 reg.exe 16->36         started        45 2 other processes 18->45 49 C:\2ba9136faa5bd9f2d7922daf\sqmapi.dll, PE32 20->49 dropped 51 C:\2ba9136faa5bd9f2d7922daf\SetupUi.dll, PE32 20->51 dropped 53 C:\2ba9136faa5bd9f2d7922daf\SetupEngine.dll, PE32 20->53 dropped 61 11 other files (none is malicious) 20->61 dropped 38 Setup.exe 2 9 20->38         started        87 Uses cmd line tools excessively to alter registry or file data 23->87 41 conhost.exe 23->41         started        43 more.com 1 23->43         started        55 C:\Windows\SysWOW64\vcomp100.dll, PE32 25->55 dropped 57 C:\Windows\SysWOW64\mfcm100u.dll, PE32 25->57 dropped 59 C:\Windows\SysWOW64\mfcm100.dll, PE32 25->59 dropped 63 16 other files (none is malicious) 25->63 dropped 81 142.250.184.206 GOOGLEUS United States 27->81 83 172.67.150.95 CLOUDFLARENETUS United States 27->83 89 Tries to harvest and steal browser information (history, passwords, etc) 27->89 47 4 other processes 27->47 file8 signatures9 process10 signatures11 85 Installs new ROOT certificates 38->85
Verdict:
unknown
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Checks computer location settings
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
MD5 hash:
1cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA1 hash:
0b9519763be6625bd5abce175dcc59c96d100d4c
SH256 hash:
ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a
MD5 hash:
38caa11a462b16538e0a3daeb2fc0eaf
SHA1 hash:
c22a190b83f4b6dc0d6a44b98eac1a89a78de55c
SH256 hash:
b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
MD5 hash:
80e44ce4895304c6a3a831310fbf8cd0
SHA1 hash:
36bd49ae21c460be5753a904b4501f1abca53508
SH256 hash:
5d9ceb1ce5f35aea5f9e5a0c0edeeec04dfefe0c77890c80c70e98209b58b962
MD5 hash:
ec0504e6b8a11d5aad43b296beeb84b2
SHA1 hash:
91b5ce085130c8c7194d66b2439ec9e1c206497c
SH256 hash:
3f47a24d6eeb1203e3325f0b06023e9678df7e860e953925057de17e6c539be4
MD5 hash:
fd78a68cb7e9fa26dec0d9d1b2342c72
SHA1 hash:
06d39a9eadc6d4272a5ae2f2ce632de5628d375b
SH256 hash:
b9682a9283e34ce3623b07471997a96f3bc7900677fbb0066a8f2e9749282d8f
MD5 hash:
6cb5e47b9cdec9d79e61eb3df52dd091
SHA1 hash:
dcc5ea52c93153e31bb014e71b4c88b88e4b93a9
SH256 hash:
624bf54075522addc40190f3cc1358667da9b7b5d7f375607fea6b1cabb3fbae
MD5 hash:
a566632f3463841db157540eb8f06e30
SHA1 hash:
687b4a9a381b725e71dc5e7ef208f279aca1d7d4
SH256 hash:
9e0dd1aa9f189699de5eb42d2d6f55ad8d777a629ad32b645dc7802c80399af8
MD5 hash:
2e16c122d4488c0e8c6c14626668cb2a
SHA1 hash:
34c363090747935ab94476844ab54a6d6f027ac0
SH256 hash:
b9f67925a648bb17c578a22416e77836b0deea82f82186e774401df956c510cd
MD5 hash:
ef37d0c5558e62e662e5723dff93dfe1
SHA1 hash:
2409efe3387e6b9d66fb1694e0981d3b84756fc6
SH256 hash:
1a7d1373265847ad8469a5df8553ff02083382c92ea203647e47748c0d6d0344
MD5 hash:
82aea891a685d4409ca9b2f9deee61bc
SHA1 hash:
44eb4a0117916f5cf075ec46c870ab18e50bf25e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:NSIS_April_2024
Author:NDA0N
Description:Detects NSIS installers
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
COM_BASE_APICan Download & Execute componentsole32.dll::CoCreateInstance
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::SetFileSecurityW
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::SHFileOperationW
SHELL32.dll::SHGetFileInfoW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDiskFreeSpaceW
KERNEL32.dll::GetCommandLineW
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileExW
KERNEL32.dll::MoveFileW
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::AppendMenuW
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::OpenClipboard
USER32.dll::PeekMessageW
USER32.dll::CreateWindowExW

Comments