Malware Analysis Report

2025-06-16 04:03

Sample ID 221226-wnchfsge5w
Target Request_12-23#183.iso
SHA256 f3a9b733cb33c4d257589e70c8d9cf4b5136cb3932bce2ea1b31bc9d5b06a5ae
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

f3a9b733cb33c4d257589e70c8d9cf4b5136cb3932bce2ea1b31bc9d5b06a5ae

Threat Level: Likely benign

The file Request_12-23#183.iso was found to be: Likely benign.

Malicious Activity Summary


Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-12-26 18:03

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-12-26 18:03

Reported

2022-12-26 18:07

Platform

win7-20221111-en

Max time kernel

129s

Max time network

31s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\Request_12-23#183.iso

Signatures

Enumerates physical storage devices

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\System32\isoburn.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1168 wrote to memory of 576 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\isoburn.exe
PID 1168 wrote to memory of 576 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\isoburn.exe
PID 1168 wrote to memory of 576 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\isoburn.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\Request_12-23#183.iso

C:\Windows\System32\isoburn.exe

"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\Request_12-23#183.iso"

Network

N/A

Files

memory/1168-54-0x000007FEFBFC1000-0x000007FEFBFC3000-memory.dmp

memory/576-76-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-12-26 18:03

Reported

2022-12-26 18:06

Platform

win10v2004-20220812-en

Max time kernel

107s

Max time network

144s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\Request_12-23#183.iso

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeManageVolumePrivilege N/A C:\Windows\system32\cmd.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\system32\cmd.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\Request_12-23#183.iso

Network

Country Destination Domain Proto
N/A 93.184.220.29:80 tcp
N/A 104.110.191.140:80 tcp
N/A 40.79.150.121:443 tcp
N/A 178.79.208.1:80 tcp
N/A 178.79.208.1:80 tcp
N/A 178.79.208.1:80 tcp

Files

N/A