Analysis
-
max time kernel
599s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14/06/2022, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
document.iso
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
document.iso
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
document.iso
-
Size
3.1MB
-
MD5
8b76eb981cb9a08767a93f1c3bdbf3df
-
SHA1
4d558beaaa7af0e1232fe8d5436f7be0dd674660
-
SHA256
23c10f0ff64c3161ac221e9cd6eae744b3260f0ac346cca4cc7afa770b60c0da
-
SHA512
4ea530db2356f434bc7f879926d8ee7a0f4515fa203d576ae7141d7d18477510a7e84049f5aabb350ee10c8315bb9a4cba6e61eee578ddbb553cb37386b13955
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1372 cmd.exe