Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-10-2022 21:35
Static task
static1
Behavioral task
behavioral1
Sample
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
RECHNUNG.chm
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
RECHNUNG.chm
Resource
win10v2004-20220812-en
General
-
Target
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso
-
Size
1.2MB
-
MD5
07f94938347091978c25af1a7f42f72f
-
SHA1
5260230f225ca88e903357e72b2a6e2b2007162d
-
SHA256
0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f
-
SHA512
11b17e7474dee868276520be680616b7a3433016dda071d26e65d82b0eab0179e755d91bcaf060a6c5047ff429f159fd4351ffae7c9f5a1cb952990de07fd628
-
SSDEEP
192:NtOIXco/1QY0OXlb3iQbZaEaJT5cC+aRWTwY2TZhYj1HhIUb:Vcodln53HZ/aLWa0MY21YIc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1512 1112 cmd.exe 27 PID 1112 wrote to memory of 1512 1112 cmd.exe 27 PID 1112 wrote to memory of 1512 1112 cmd.exe 27
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\0db4df6533bbe4f721a016b59e89c0ed2ab9af0dec7a8200f7f0e83617bf3d9f.iso"2⤵PID:1512
-