Analysis
-
max time kernel
29s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 03:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Symmi.62789.8540.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Symmi.62789.8540.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Variant.Symmi.62789.8540.exe
-
Size
1.0MB
-
MD5
4c5fcb8c248337612968ed1ea3715516
-
SHA1
472373a2d24b5bc9eacaf9f094e8ff995aef4028
-
SHA256
b12fa782c5a1e950d3a2a2ae57bb843c56efe1994f25a02fd088f312ea8523bc
-
SHA512
4a3af215cefa05fb9e7f8d2ff1f11eb9466221ec63915234ffc068970eaec2d88a1915be5c209631ab45ac298fe6515b809a6403d5be5f22f3001f4a0a8ab6dd
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SecuriteInfo.com.Variant.Symmi.62789.8540.exepid process 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Variant.Symmi.62789.8540.exedescription pid process target process PID 904 wrote to memory of 1836 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe cmd.exe PID 904 wrote to memory of 1836 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe cmd.exe PID 904 wrote to memory of 1836 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe cmd.exe PID 904 wrote to memory of 1836 904 SecuriteInfo.com.Variant.Symmi.62789.8540.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Symmi.62789.8540.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Symmi.62789.8540.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\2⤵PID:1836
-