Analysis
-
max time kernel
124s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 23:59
Static task
static1
Behavioral task
behavioral1
Sample
EW61.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
EW61.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
WW.js
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
WW.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
animators/simultaneity.dll
Resource
win7-20221111-en
General
-
Target
EW61.iso
-
Size
970KB
-
MD5
56b0aa615092e5ebc9fde96d4e07350e
-
SHA1
27f9a601fd991c08351b19c148bc339bde51d145
-
SHA256
07ca6bef6ca567c4fb982a5dfc5c3f7aa1ec86b406401b6b01a344cbeb7089e6
-
SHA512
81dcc18bbdceb0ba8c45969706f8a00ca383f48c2abfc612e58035cdb2278daabf8971c1d32d1a32a5592fa79947a7ca562cde9d44970c648a7865f2fe56a3ac
-
SSDEEP
12288:yoeKwnON76F+DfZxL4+Dir8lkQ5z4hbrmKFX4GfOs5VBNYRbWAUWWvoYPiwBP2vo:yoeKwW6F+DRt4Tr8lkBh/p2QOUZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 340 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1576 wrote to memory of 340 1576 cmd.exe isoburn.exe PID 1576 wrote to memory of 340 1576 cmd.exe isoburn.exe PID 1576 wrote to memory of 340 1576 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\EW61.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\EW61.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:340
-