Analysis
-
max time kernel
127s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 22:52
Static task
static1
Behavioral task
behavioral1
Sample
CU20.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
CU20.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
cushioned/pamphlets.dll
Resource
win7-20221111-en
General
-
Target
CU20.iso
-
Size
996KB
-
MD5
2a76c3791469f0659a1d9c81ea3fda16
-
SHA1
622903509a4d8a90be943c33d9bcc73d943d3b0c
-
SHA256
8302aaa90f7757bb976115ea74c068ff3e699b08fd22526ab705c5c8bcdc155c
-
SHA512
9b74eaa3d60f9f6d626e0a312ee1a51f521472ee3490dd6165153f4481a203897cac06d7f884e7ec583e40f754da8723996116b26a2821ac6a4e91fbd645c69e
-
SSDEEP
24576:GYowvwJwRwJZwSw5wqwfHH8H2HHLwRx4Yk7A4DUESxg9MuI4vhL3tXC2Hk:WwvwJwRwJZwSw5wqwfHH8H2HHLwRuY09
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 1396 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1260 wrote to memory of 1396 1260 cmd.exe isoburn.exe PID 1260 wrote to memory of 1396 1260 cmd.exe isoburn.exe PID 1260 wrote to memory of 1396 1260 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CU20.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\CU20.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1396
-