Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31/10/2022, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
DV_7727.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DV_7727.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
DV.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
DV.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
selectable/jagged.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
selectable/jagged.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
selectable/outstaying.dll
Resource
win7-20220812-en
General
-
Target
DV_7727.iso
-
Size
480KB
-
MD5
6be0781ecefcebf24181cac4d13aead9
-
SHA1
bd75f2c9556c9b894e53767fb461d1b79bd10916
-
SHA256
034d086204855ae91d17a392e1aca00cf6e09ad2449d0f8438c5b5419d16d202
-
SHA512
2307c16f8914f0a97cf24b4360e933339fccb17b003dd7ae292228e8e562ab8272907f8ef0396352d1acea91c9f9e70e0f3d9a29035d2d5bfa3731555b54dd8d
-
SSDEEP
6144:/kbHJhzU/Gr+acU2gqnEIzGOEBPepzn6WX1LB5QpK1K0we5itwWUTDAO7V:uheLacnx5dFBOpawe5iFw1V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2036 1208 cmd.exe 28 PID 1208 wrote to memory of 2036 1208 cmd.exe 28 PID 1208 wrote to memory of 2036 1208 cmd.exe 28