Analysis

  • max time kernel
    599s
  • max time network
    602s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14/06/2022, 17:51

General

  • Target

    document.iso

  • Size

    3.1MB

  • MD5

    8b76eb981cb9a08767a93f1c3bdbf3df

  • SHA1

    4d558beaaa7af0e1232fe8d5436f7be0dd674660

  • SHA256

    23c10f0ff64c3161ac221e9cd6eae744b3260f0ac346cca4cc7afa770b60c0da

  • SHA512

    4ea530db2356f434bc7f879926d8ee7a0f4515fa203d576ae7141d7d18477510a7e84049f5aabb350ee10c8315bb9a4cba6e61eee578ddbb553cb37386b13955

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\document.iso
    1⤵
    • Modifies registry class
    • Suspicious behavior: LoadsDriver
    PID:1372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads