Overview
overview
10Static
static
db212c6801...35.iso
windows7-x64
3db212c6801...35.iso
windows10-2004-x64
3Contract.lnk
windows7-x64
3Contract.lnk
windows10-2004-x64
3consorter/...nt.cmd
windows7-x64
1consorter/...nt.cmd
windows10-2004-x64
1consorter/...rs.cmd
windows7-x64
1consorter/...rs.cmd
windows10-2004-x64
1consorter/...ts.dll
windows7-x64
10consorter/...ts.dll
windows10-2004-x64
10Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-11-2022 18:15
Static task
static1
Behavioral task
behavioral1
Sample
db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Contract.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Contract.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
consorter/advertisement.cmd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
consorter/advertisement.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
consorter/dissuaders.cmd
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
consorter/dissuaders.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
consorter/theorists.dll
Resource
win7-20220812-en
General
-
Target
db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735.iso
-
Size
514KB
-
MD5
b70158a27709abc43afb36b57d8c379f
-
SHA1
8715f35ab29bfce6b8f3aef8796d53ab0c00f47a
-
SHA256
db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735
-
SHA512
37643f5e283b3968d32d3574b7cf4301ecc3f34d6cbebb4faf68a6bb56cc496ee1bd1c8ff4deba1a78842bc4e82b620cddfb35034f0c96da78859cbf52051938
-
SSDEEP
12288:ZLVZw4wIOlwQs/tMrbQHt+psTw6RcA3/2oXmbTdaUT:5VZw4wnwQs/tMPQBZRce9qJak
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1636 wrote to memory of 2036 1636 cmd.exe isoburn.exe PID 1636 wrote to memory of 2036 1636 cmd.exe isoburn.exe PID 1636 wrote to memory of 2036 1636 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735.iso1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\db212c6801f438aeb2553e38078d9995f547a51731ad68062376e762bfaec735.iso"2⤵