Overview
overview
10Static
static
AH-703.iso
windows7-x64
3AH-703.iso
windows10-2004-x64
3AS.js
windows7-x64
10AS.js
windows10-2004-x64
10fix/adjutant.js
windows7-x64
3fix/adjutant.js
windows10-2004-x64
7fix/data.txt
windows7-x64
1fix/data.txt
windows10-2004-x64
1fix/hypers...ss.ps1
windows7-x64
1fix/hypers...ss.ps1
windows10-2004-x64
1Resubmissions
28-11-2022 19:10
221128-xvd6ashh56 1028-11-2022 19:09
221128-xtsmashh23 1028-11-2022 15:04
221128-sf2wlacc29 10Analysis
-
max time kernel
430s -
max time network
436s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
AH-703.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AH-703.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
AS.js
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
AS.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
fix/adjutant.js
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
fix/adjutant.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
fix/data.txt
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
fix/data.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
fix/hypersensitiveness.ps1
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
fix/hypersensitiveness.ps1
Resource
win10v2004-20221111-en
General
-
Target
AH-703.iso
-
Size
690KB
-
MD5
af9275a091121de13eaed391a65b620b
-
SHA1
17734a19fd3e944d207509bb1e178ad776651682
-
SHA256
078d03f798ce2c658d0fc1267ba141e836ca618e136c8f01b778f1e8bfb3721b
-
SHA512
33ce1006aab78e809380df98b9aa7f241953e377bdf826830485f0a0a28ae50798ba185c94e3fba0ea6cbb9ca69f882a21c7600b84c38002f4a46ce60ca0bc92
-
SSDEEP
12288:nm1Mcw5EO6dHvDe0P3lx5EBto8BkfzNbuTyGrC6N2c2mcsAMzRGBRA4cZD:UMFEO6dHvDe0P335EXpUNSleQ2cYCGLc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 856 wrote to memory of 2000 856 cmd.exe isoburn.exe PID 856 wrote to memory of 2000 856 cmd.exe isoburn.exe PID 856 wrote to memory of 2000 856 cmd.exe isoburn.exe