Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-07-2022 00:03
Static task
static1
Behavioral task
behavioral1
Sample
ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c.iso
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c.iso
Resource
win10v2004-20220414-en
General
-
Target
ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c.iso
-
Size
2.6MB
-
MD5
ffe5b129fabddd3302aef956414b7f35
-
SHA1
26ffdf171e98a9ef1c54574d6227596a1af9c3f9
-
SHA256
ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c
-
SHA512
3e9cb4e120a45aa42f738046a219d20ec5f6363c47183fa08c1a26871e054f5b0ec78d2b6f07aac66300d7dac3e1d4f9f8c90ab6d4cf0879f85af3e06712a699
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1216 wrote to memory of 340 1216 cmd.exe isoburn.exe PID 1216 wrote to memory of 340 1216 cmd.exe isoburn.exe PID 1216 wrote to memory of 340 1216 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\ef24e2502b962414d862dcb115122c70a786a52f933467a546eb85999027d92c.iso"2⤵PID:340
-