Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16-11-2022 00:44
Static task
static1
Behavioral task
behavioral1
Sample
CVUO05.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CVUO05.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
CV.vbs
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
CV.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
inducted/dialectician.dll
Resource
win7-20221111-en
General
-
Target
CVUO05.iso
-
Size
722KB
-
MD5
d9e7ba5bf8b8d43cd61c6bcaf53bcc77
-
SHA1
eb215ad50be152723eea669c5230ab8688e1edd8
-
SHA256
ea64bba77296ccdd5522c8c70186b962425239c98b77dc1bcbb7f66530ba9703
-
SHA512
146fc4334812d8a4378d10ba70ccbc1b9584422a0eedff0562b85a223fbd1cb579169c2a4a3df5b494262ecb1a8727451b3503e9550713ff8f0c407098e17756
-
SSDEEP
12288:mY5/TGcg+w9KCyJdcvXumiT3QOrT8Rk0zvInbiPCw18al1USuSZxHHTkG/8H8:mY5/TGckKCy30IAIQR3O7OjHHApc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1660 wrote to memory of 2044 1660 cmd.exe isoburn.exe PID 1660 wrote to memory of 2044 1660 cmd.exe isoburn.exe PID 1660 wrote to memory of 2044 1660 cmd.exe isoburn.exe