Analysis
-
max time kernel
133s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 06:59
Static task
static1
Behavioral task
behavioral1
Sample
NH09.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
NH09.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cushioned/gaits.dll
Resource
win7-20221111-en
General
-
Target
NH09.iso
-
Size
996KB
-
MD5
afd3aafce1eb18f0c75691c04a6067a8
-
SHA1
f9a977a82d69d42535032fb54dabf1a18e2278dd
-
SHA256
3ebcabb9a00211e1aa0ec6509f4d6206e6fab30da4a5bf6267292b9578859393
-
SHA512
f175da5e38239cf7134084c8ab56eadfe13ac811585f3ea397ac8ff197efe7468b1bb3ae487f53006a978bafc6691ee384f6c63de10ddaac3718fed43e4023e6
-
SSDEEP
24576:aYNx4Yk7A4DUESxr9MuI4vhL3tXwwvwJwRwJZwSw5wqwfHH8H2HHLwu2Hk:HuY0ArHgT4vJ3tXwwvwJwRwJZwSw5wqj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 884 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2024 wrote to memory of 884 2024 cmd.exe isoburn.exe PID 2024 wrote to memory of 884 2024 cmd.exe isoburn.exe PID 2024 wrote to memory of 884 2024 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NH09.iso1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\NH09.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:884
-