Analysis

  • max time kernel
    91s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2022 00:54

General

  • Target

    DI45.iso

  • Size

    996KB

  • MD5

    0f088acd4abfa3a4815b9e2353dad31f

  • SHA1

    d2d75756bf05e750c7bb8fedef371b0226ca9e08

  • SHA256

    1590ffeabb381c2ac3bb5d03e3f2079382031776317d78580b066bcde3f75cde

  • SHA512

    c5a52c2ffa7832b600b251969b9a9056258bdbded6516fc5d6b35abc2a3abf1d01c8643071cef43f8d95b04098b1443bfe75aa17fa9e69f1a28ac01936504be1

  • SSDEEP

    24576:cYKwvwJwRwJZwSw5wqwfHH8H2HHLwRx4Yk7A4DUESxv9MuI4vhL3tXC2Hk:KwvwJwRwJZwSw5wqwfHH8H2HHLwRuY0O

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DI45.iso
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads