Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
FE95.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
FE95.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cushioned/neatness.dll
Resource
win7-20220901-en
General
-
Target
FE95.iso
-
Size
996KB
-
MD5
1008647a6a70e1df84bf8925a3029994
-
SHA1
93baf5dfdaeb8d877faff27b7307c448e23b6986
-
SHA256
0683830c1e77a33ee4d92109770cbaca0a7af5ff46aabc2e840d55a1e90c5b2d
-
SHA512
4af9e1368bc402ef42c46a324677fecadb875b56694f24f355b44a71d7fd59d4e1fbe74865650d6466e0b8ee1078597f200fa27564ee39450b0a380ca4644ee3
-
SSDEEP
24576:MY6wvwJwRwJZwSw5wqwfHH8H2HHLwRx4Yk7A4DUESxl9MuI4vhL3tXC2Hk:KwvwJwRwJZwSw5wqwfHH8H2HHLwRuY0E
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1892 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1892 AUDIODG.EXE Token: 33 1892 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1892 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1844 wrote to memory of 1576 1844 cmd.exe isoburn.exe PID 1844 wrote to memory of 1576 1844 cmd.exe isoburn.exe PID 1844 wrote to memory of 1576 1844 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FE95.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\FE95.iso"2⤵PID:1576
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1848
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5701⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892