Overview
overview
7Static
static
document_Y...22.iso
windows7-x64
3document_Y...22.iso
windows10-2004-x64
3data.txt
windows7-x64
1data.txt
windows10-2004-x64
1document.vbs
windows7-x64
3document.vbs
windows10-2004-x64
7overhauled/dozens.gif
windows7-x64
1overhauled/dozens.gif
windows10-2004-x64
1overhauled...ry.dll
windows7-x64
1overhauled...ry.dll
windows10-2004-x64
1overhauled...ss.png
windows7-x64
3overhauled...ss.png
windows10-2004-x64
3Analysis
-
max time kernel
101s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 06:29
Static task
static1
Behavioral task
behavioral1
Sample
document_Y265_Nov#22.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
document_Y265_Nov#22.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
data.txt
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
data.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
document.vbs
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
document.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
overhauled/dozens.gif
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
overhauled/dozens.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
overhauled/honorary.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
overhauled/honorary.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
overhauled/superlativeness.png
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
overhauled/superlativeness.png
Resource
win10v2004-20221111-en
General
-
Target
document_Y265_Nov#22.iso
-
Size
1.2MB
-
MD5
d782ce153ee4ff3e2e923e59490f30d6
-
SHA1
1d91a7c75acd202ecf89bd001660885b99c37b98
-
SHA256
9f732f21cd6bea13a4dbabbf90aa687cafd5b4b530ec27066152479e37f4cec8
-
SHA512
eb3796e5030727b1859cd4bf949d45aa24cc6c2516a50ae1dc21e65c72bfaf7af77760d2fdaf0d7bf18766df88885c31e66b7987be1f085dc83f501c7ea9088b
-
SSDEEP
24576:vtE8Z3shoA9qB8DvUAZkl9iIDIQIFaOGYnknF6:e8vmqB8DUAZklKxnknF6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zG.exepid process 1760 7zG.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zG.exedescription pid process Token: SeRestorePrivilege 1760 7zG.exe Token: 35 1760 7zG.exe Token: SeSecurityPrivilege 1760 7zG.exe Token: SeSecurityPrivilege 1760 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid process 1760 7zG.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1456 wrote to memory of 664 1456 cmd.exe isoburn.exe PID 1456 wrote to memory of 664 1456 cmd.exe isoburn.exe PID 1456 wrote to memory of 664 1456 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\document_Y265_Nov#22.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\document_Y265_Nov#22.iso"2⤵PID:664
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\SwitchRename\" -spe -an -ai#7zMap11553:82:7zEvent205951⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1760