Resubmissions

10-10-2022 10:53

221010-my8h7sbed4 3

05-10-2022 07:00

221005-hsxsasdghk 10

Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 10:53

General

  • Target

    PO_No._ANOP0652.iso

  • Size

    58KB

  • MD5

    8e35d03323c1e6523fea86b2bbb9d5d5

  • SHA1

    328bcf16dd57b79519d3a04650daf4e061d3ed97

  • SHA256

    f94bc4afc483d0024914be203ee502efb7340cfa1911d7a3e680e5d915af166c

  • SHA512

    87dcd877c7a8b633dd881e63007013aba382aef69486e8a16214d57ced846c43327c266eb39c96f7cb0b24aae62640b9fb86ad1c79a17a15a502f376aae51958

  • SSDEEP

    96:58kzl0brb54gxLO1o9+fY29v+NYDHa9r3KvzNtnT:tW/5JxLOG4Xv+wG2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\PO_No._ANOP0652.iso
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\System32\isoburn.exe
      "C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\PO_No._ANOP0652.iso"
      2⤵
        PID:1156

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1156-76-0x0000000000000000-mapping.dmp
    • memory/1956-54-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
      Filesize

      8KB