Analysis
-
max time kernel
127s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-12-2022 19:08
Static task
static1
Behavioral task
behavioral1
Sample
NewRules_EOM0.iso
Resource
win7-20221111-en
3 signatures
300 seconds
General
-
Target
NewRules_EOM0.iso
-
Size
1.0MB
-
MD5
b2b2a3673e2cae92bc63484757a95eae
-
SHA1
36df5bab5cf803d303c7f942e73f45807afb52b1
-
SHA256
5ecf9f18ab957cb09c144d083e22ade66e2924cf5fa4423b06977ccb23d1bd40
-
SHA512
4661fb5f3c97b5d64c1226b4774d4f61278ec161946d1d19fba5032aa5865ac35cf1b0dc38ea011ef577390246ef8fdfb7b81d71ee9324aca091164c6b888dfd
-
SSDEEP
12288:D7uM8sVm1kWF/eLJ+QlfW4MwauXWfFyDFfEWmqTqQpa4NLVZC7K:D+sVmhledMmGdu+ZqHzC7K
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
isoburn.exepid process 568 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 836 wrote to memory of 568 836 cmd.exe isoburn.exe PID 836 wrote to memory of 568 836 cmd.exe isoburn.exe PID 836 wrote to memory of 568 836 cmd.exe isoburn.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NewRules_EOM0.iso1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\NewRules_EOM0.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam