Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2022 17:05

General

  • Target

    invoice#488394.iso

  • Size

    1.3MB

  • MD5

    849846adc858b2dca012a11089329baa

  • SHA1

    65d5ef6dec450a14bd24a5f6ee6d0d739d2f82a2

  • SHA256

    aa03c1ee92830ad562bbb2c0c3d840367e19a1a4f3a7bc03c7e3cfa8a6951606

  • SHA512

    eb6259369740c802f83fc00353914da3942c71d121a09ad1443679760f531011e49eeb30860a8521b145e7cc8b4808ed819691edf2db219ae3fd783d02e5e8c7

  • SSDEEP

    12288:GP0hJ5HRw7GwUwjw1wJgHwYwfw69GwHwMwMcwp8wDftkAqfw45EZUw3xCwlNwcwr:GP0hJ5Hzdx7zs7oj7xH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\invoice#488394.iso
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads