Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 23:23
Static task
static1
Behavioral task
behavioral1
Sample
MI41.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
MI41.iso
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cushioned/diadems.dll
Resource
win7-20221111-en
General
-
Target
MI41.iso
-
Size
996KB
-
MD5
2bd47a3018960d9438e41a85221c304f
-
SHA1
9e21727a38a93e72ea808f2effbc1f91916ecd8c
-
SHA256
49cae57a7ece00af7ea93c38b031d90d45c103d5ff1de1d205f23437e2a04e27
-
SHA512
03a1bc728b488a1ec6ef227ba0ecedc90f7b4411f96772654ec96f45bf528cc2fe21a3b845cb793e91844030d6a539a4a2e6e4f9a442000f5df15aba198d6776
-
SSDEEP
24576:RYFx4Yk7A4DUESxc9MuI4vhL3tXwwvwJwRwJZwSw5wqwfHH8H2HHLwu2Hk:0uY0ArHRT4vJ3tXwwvwJwRwJZwSw5wqj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1044 wrote to memory of 948 1044 cmd.exe isoburn.exe PID 1044 wrote to memory of 948 1044 cmd.exe isoburn.exe PID 1044 wrote to memory of 948 1044 cmd.exe isoburn.exe