Analysis
-
max time kernel
39s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 23:10
Static task
static1
Behavioral task
behavioral1
Sample
CVWC35.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CVWC35.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
CV.vbs
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
CV.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
inducted/rebuttal.dll
Resource
win7-20221111-en
General
-
Target
CVWC35.iso
-
Size
722KB
-
MD5
b506204da4446139f5fb282ad0f877b4
-
SHA1
2746ee2fbfd179c90c332fdc98872b958c6c79c0
-
SHA256
2194c5e9c048a6125373d6c43da58f81bc33595943d8c631ed7571eb43054d0b
-
SHA512
6202c47a0372c756355d28c6758cf838ad60220e6b3b41f6c8a6d98fa5f6f88877649294e8485a844f748a6251ccaa963b6e5a6bcb1aef7b8badf432d9aa3179
-
SSDEEP
12288:6YJ/TGcg+w9KCZJdcvXumiT3QOrT8Rk0zvInbiPCw18al1USuSZxHHTkG/8H8:6YJ/TGckKCZ30IAIQR3O7OjHHApc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 544 wrote to memory of 1308 544 cmd.exe isoburn.exe PID 544 wrote to memory of 1308 544 cmd.exe isoburn.exe PID 544 wrote to memory of 1308 544 cmd.exe isoburn.exe