Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
document.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
document.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
tar.dll
Resource
win7-20220812-en
General
-
Target
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso
-
Size
2.8MB
-
MD5
b87965a169aeed19577d9a78f8feeaf9
-
SHA1
2efc40286e1cad294628fb38a9524d9634788908
-
SHA256
4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b
-
SHA512
c9ee37525e5a79ef86f39f189cf7a3df69bd421b2ad153ca25b049afeeb18bbb9e1f466dfb9d595bf71f4ec05ca873c001a01814a61b939902890e94c8ee14f4
-
SSDEEP
49152:AiU4m3k9LdQ5rrVggzz5UqIdFneQuXnMcjq4lfv9s3c59mf6CKJUQajLWW:yHmLdQtrVggzBITeQunMcW4lfloc59mx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1672 wrote to memory of 960 1672 cmd.exe 28 PID 1672 wrote to memory of 960 1672 cmd.exe 28 PID 1672 wrote to memory of 960 1672 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\4518b5c65eb93ff1e31024f61e25569a9903753816d50e7258722bb608e3cf1b.iso"2⤵PID:960
-