Analysis
-
max time kernel
187s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09/05/2022, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Symmi.62789.26543.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Symmi.62789.26543.exe
Resource
win10v2004-20220414-en
General
-
Target
SecuriteInfo.com.Variant.Symmi.62789.26543.exe
-
Size
1.1MB
-
MD5
29a444fd62712cdfea44c8cb97d7b7e7
-
SHA1
027a76d7335c0070bbb2b085b6119ec3adf76547
-
SHA256
8ed0529363d69b1748385178a6e7f894652ab642d314a984ec19599d591fbdb4
-
SHA512
e9ede4fd1044ced991a4c46c77fc70ededf89b25c9918ec76efdc1c6ae90a0194e0fe877b26a7fc60f59f7f275b2b268797ee0cc843c9c65b3b68708c816cb94
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3116 mspaint.exe 3116 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 3116 mspaint.exe 3116 mspaint.exe 3116 mspaint.exe 3116 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4300 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 81 PID 1408 wrote to memory of 4300 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 81 PID 1408 wrote to memory of 4300 1408 SecuriteInfo.com.Variant.Symmi.62789.26543.exe 81 PID 4300 wrote to memory of 3116 4300 cmd.exe 83 PID 4300 wrote to memory of 3116 4300 cmd.exe 83 PID 4300 wrote to memory of 3116 4300 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Symmi.62789.26543.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Symmi.62789.26543.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\877976.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\877976.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4480