Analysis
-
max time kernel
37s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 02:25
Static task
static1
Behavioral task
behavioral1
Sample
TA67.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TA67.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
cushioned/ludicrous.dll
Resource
win7-20220812-en
General
-
Target
TA67.iso
-
Size
996KB
-
MD5
da33d3c16d6dbd1b653c248fa62ca9bb
-
SHA1
e45011dc71e2af21f74e87fb7cf25568624d8f20
-
SHA256
e0b5e015370def4853a2fa5bc0bfe613a05d6509224295e598015e26d458bfbb
-
SHA512
e42b1b2f85f3971cb4fe9c819cce81ed972d72b2069eaa745173c396e48ec54476f8598b1bf4b3d934966e861818b865b041d6e19d913a54d69804b7f3a411a0
-
SSDEEP
24576:sYowvwJwRwJZwSw5wqwfHH8H2HHLwRx4Yk7A4DUESxV9MuI4vhL3tXC2Hk:4wvwJwRwJZwSw5wqwfHH8H2HHLwRuY0M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1836 wrote to memory of 948 1836 cmd.exe isoburn.exe PID 1836 wrote to memory of 948 1836 cmd.exe isoburn.exe PID 1836 wrote to memory of 948 1836 cmd.exe isoburn.exe