Overview
overview
10Static
static
456012a585...56.iso
windows7-x64
3456012a585...56.iso
windows10-2004-x64
3Claim_Letter.lnk
windows7-x64
3Claim_Letter.lnk
windows10-2004-x64
3about/myOf.js
windows7-x64
3about/myOf.js
windows10-2004-x64
1about/thereIn.dll
windows7-x64
10about/thereIn.dll
windows10-2004-x64
10about/withIt.bat
windows7-x64
1about/withIt.bat
windows10-2004-x64
1Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 08:52
Static task
static1
Behavioral task
behavioral1
Sample
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Claim_Letter.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Claim_Letter.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
about/myOf.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
about/myOf.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/thereIn.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
about/thereIn.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
about/withIt.bat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
about/withIt.bat
Resource
win10v2004-20220901-en
General
-
Target
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso
-
Size
430KB
-
MD5
6e2eae735721ceaa59b967810fb5b44f
-
SHA1
7390800e71325753ae472815e8b5c653a99d6fb1
-
SHA256
456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56
-
SHA512
bde0544e0807afe48a97fae13348295b4be1d5d9e59c6c45878c7c1fc997e591ab956ce86a527848d6b43e76d3576fc47ac2a5dc0c6974b0512bc0d7659051be
-
SSDEEP
6144:eu8T9zrStWm3C3klS1gqbe5L05kVxVFInAPexY5ixyizO8wj+A:J8ZSg24Vbe5LFVxVFIAPWelSZm
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 564 wrote to memory of 1224 564 cmd.exe isoburn.exe PID 564 wrote to memory of 1224 564 cmd.exe isoburn.exe PID 564 wrote to memory of 1224 564 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso1⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\456012a585a2320e798cd0cab4d66221cdd1a4cec1084993aac262a045586c56.iso"2⤵PID:1224
-