Analysis
-
max time kernel
37s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 03:26
Static task
static1
Behavioral task
behavioral1
Sample
UZ08.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
UZ08.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cushioned/multi.dll
Resource
win7-20220812-en
General
-
Target
UZ08.iso
-
Size
996KB
-
MD5
419b2dbb878c76168c184805d8ac38e5
-
SHA1
25416b5d0481bf7213b6eb08aed3d033f8d3615b
-
SHA256
c74708ce68f102dae62385f9665d9eb1cde9e9143e6f01a27e0f42a76f248030
-
SHA512
b33b2dd2b34b300156f11b506b6f75f314faa05c9863e4487bda06d23f89121944289d13f1b1cc99cf36d27ca2415384768009fc57e9127f8ebfd98491207dbe
-
SSDEEP
24576:PYYwvwJwRwJZwSw5wqwfHH8H2HHLwRx4Yk7A4DUESxZ9MuI4vhL3tXC2Hk:FwvwJwRwJZwSw5wqwfHH8H2HHLwRuY0M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1300 wrote to memory of 1928 1300 cmd.exe isoburn.exe PID 1300 wrote to memory of 1928 1300 cmd.exe isoburn.exe PID 1300 wrote to memory of 1928 1300 cmd.exe isoburn.exe