Analysis
-
max time kernel
120s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-11-2022 01:30
Static task
static1
Behavioral task
behavioral1
Sample
WI34.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
WI34.iso
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
WW.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
WW.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
animators/valuable.dll
Resource
win7-20221111-en
General
-
Target
WI34.iso
-
Size
970KB
-
MD5
c183d13389f1e6418b6992e717d8cb68
-
SHA1
8461fd13a2f5986fbdca62dcb6870f6bf0cfec91
-
SHA256
a9667421d92708fdeda118f75916afd6a904fbcf2ba85c1fd7d41d14021137b9
-
SHA512
7da9ecde9b0d3f00faff43bf73db25aaa1fb0cba5ed55cffd37bd07c7a4630f8dc033b7c4689c4ec92255ff1c81eeb043bd71219b5692560059d08b319c1e53e
-
SSDEEP
12288:xouKwnONVvoo6F+DfZxL4+Dir8lkQ5z4hbDmKFX4GfOs5VBNYRbWAUWWvoYPiwBP:xouKw9o6F+DRt4Tr8lkBhPp2QOU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 1500 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1752 wrote to memory of 1500 1752 cmd.exe isoburn.exe PID 1752 wrote to memory of 1500 1752 cmd.exe isoburn.exe PID 1752 wrote to memory of 1500 1752 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WI34.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\WI34.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1500
-