Analysis
-
max time kernel
127s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 14:53
Static task
static1
Behavioral task
behavioral1
Sample
BM60.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BM60.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
SK.vbs
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
SK.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
cushioned/crayons.dll
Resource
win7-20220812-en
General
-
Target
BM60.iso
-
Size
996KB
-
MD5
cf9aeaf54a281bf0a2ab48e750479e80
-
SHA1
afa29cd00e7771f65374acd5a9fd5070cf2f7e31
-
SHA256
4c127558b558302c7d3ed931fc499bd8570a3939d63f4a78225c0795d9a4ba84
-
SHA512
decdb2beb72da78a65c62647270a683772b63e1350f3eccf68bccda01a3b1ff40943e8491711359c54278ed4998d011cf16997cd5e2a95d538b77eb26b26aaef
-
SSDEEP
24576:pYFx4Yk7A4DUESxC9MuI4vhL3tXwwvwJwRwJZwSw5wqwfHH8H2HHLwu2Hk:8uY0ArH7T4vJ3tXwwvwJwRwJZwSw5wqj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 756 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1736 wrote to memory of 756 1736 cmd.exe isoburn.exe PID 1736 wrote to memory of 756 1736 cmd.exe isoburn.exe PID 1736 wrote to memory of 756 1736 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BM60.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\BM60.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:756
-