Overview
overview
10Static
static
Agreement_ZXY61.iso
windows7-x64
3Agreement_ZXY61.iso
windows10-2004-x64
3Agreement.js
windows7-x64
10Agreement.js
windows10-2004-x64
10data.txt
windows7-x64
1data.txt
windows10-2004-x64
1debunked/helixes.txt
windows7-x64
1debunked/helixes.txt
windows10-2004-x64
1debunked/intrepid.txt
windows7-x64
1debunked/intrepid.txt
windows10-2004-x64
1debunked/p...ss.dll
windows7-x64
10debunked/p...ss.dll
windows10-2004-x64
10Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21-11-2022 15:39
Static task
static1
Behavioral task
behavioral1
Sample
Agreement_ZXY61.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Agreement_ZXY61.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Agreement.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Agreement.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
data.txt
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
data.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
debunked/helixes.txt
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
debunked/helixes.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
debunked/intrepid.txt
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
debunked/intrepid.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
debunked/picturesqueness.dll
Resource
win7-20221111-en
General
-
Target
Agreement_ZXY61.iso
-
Size
662KB
-
MD5
f4fb2257acae4a9787809b4a6174be89
-
SHA1
9aa5b8c7782ae874fcc4dd9eca4ea219a5210276
-
SHA256
2569392ca5aeb3de4dd45280021dc7be1b3aa7dbdd32006b28c9357f58a7cf75
-
SHA512
2e902d3a36d6d5e88e72ddbc9cbb9d67ea13f396084619e4ae3e3ca09d8a973edfaccc5dd8b59508a2fd8b6377f2f4a3c33750cbc69739d14e27b4b44ff0eef7
-
SSDEEP
12288:SNWLxwOQHy6E1YF7P01JSdCLjqa/9mNdMxgligH8:SNWLxSHy6VP0/Ssfh9mUM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1096 wrote to memory of 952 1096 cmd.exe isoburn.exe PID 1096 wrote to memory of 952 1096 cmd.exe isoburn.exe PID 1096 wrote to memory of 952 1096 cmd.exe isoburn.exe