Analysis
-
max time kernel
127s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 15:18
Static task
static1
Behavioral task
behavioral1
Sample
LO30.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
LO30.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
WW.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
WW.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
port/enmity.dll
Resource
win7-20220812-en
General
-
Target
LO30.iso
-
Size
848KB
-
MD5
ea66dc4ed9a8b6bdc468355bea047eb2
-
SHA1
c257365c246ecbfea389e2a93551a91b608f1c95
-
SHA256
2b3c1cbe5454771e83d7f7a8571ed08a5e23ade79acb9596527a5bc5353351d1
-
SHA512
e80e568ac5efb8fd0f731940c7b432513ef498d833e431853cd080cfd348292bcd1f9ce5dcfc2f9bfab2d31f3570f96fb7c05f92d47834c7eb48c222093ae0da
-
SSDEEP
12288:xoDjGfBlhYUWlaVxbYUGOpGPq1Tu/VxdZlUP9Xq4F/9QVN9:xoDjkzW8wWpD9u/VLM9Xq4nQVN9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 960 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1728 wrote to memory of 960 1728 cmd.exe isoburn.exe PID 1728 wrote to memory of 960 1728 cmd.exe isoburn.exe PID 1728 wrote to memory of 960 1728 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LO30.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\LO30.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:960
-