Overview
overview
10Static
static
Agreement_KOA16.iso
windows7-x64
3Agreement_KOA16.iso
windows10-2004-x64
3Agreement.js
windows7-x64
10Agreement.js
windows10-2004-x64
10data.txt
windows7-x64
1data.txt
windows10-2004-x64
1debunked/d...ng.dll
windows7-x64
10debunked/d...ng.dll
windows10-2004-x64
10debunked/helixes.txt
windows7-x64
1debunked/helixes.txt
windows10-2004-x64
1debunked/intrepid.txt
windows7-x64
1debunked/intrepid.txt
windows10-2004-x64
1Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-11-2022 15:16
Static task
static1
Behavioral task
behavioral1
Sample
Agreement_KOA16.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Agreement_KOA16.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Agreement.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Agreement.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
data.txt
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
data.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
debunked/disheveling.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
debunked/disheveling.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
debunked/helixes.txt
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
debunked/helixes.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
debunked/intrepid.txt
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
debunked/intrepid.txt
Resource
win10v2004-20221111-en
General
-
Target
Agreement_KOA16.iso
-
Size
662KB
-
MD5
dc68236d27e1d850413758a191153a99
-
SHA1
44a8277591b02fcec0b5e9e4880ccb867e29692a
-
SHA256
c7d3f799015e5372929825edcd99d8b47b480ae707638a7d1a90edfbdc0af568
-
SHA512
7ee8b242fc0aaf32970528f88c954a01ea4351a5bfd3208f57da370b136a2610951ce513c0412437cd5bbf7d6dfe25b89147f549098171f1d80aedf6bd63bfda
-
SSDEEP
12288:XNv6E1YF7P01JSdCLjqa/9ANdMxgligH8QLxwOQH:XNv6VP0/Ssfh9AUMFLxSH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1096 wrote to memory of 1904 1096 cmd.exe isoburn.exe PID 1096 wrote to memory of 1904 1096 cmd.exe isoburn.exe PID 1096 wrote to memory of 1904 1096 cmd.exe isoburn.exe