Analysis
-
max time kernel
127s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28/12/2022, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
RulesASAP_KOP3.iso
Resource
win7-20221111-en
3 signatures
300 seconds
Behavioral task
behavioral2
Sample
RulesASAP_KOP3.iso
Resource
win10v2004-20220812-en
3 signatures
300 seconds
General
-
Target
RulesASAP_KOP3.iso
-
Size
1016KB
-
MD5
80bcb09e53031715afdbef73ef49315a
-
SHA1
a639f33652dd2d9f5b82ae89f1e102cff130bb46
-
SHA256
a43264a3052afe41bc69ca3ca576cb01628c474df5775b689d17b642447ca110
-
SHA512
3c27d8cd9ae4ab777686f72c072514240ad96f166fd546ae0d6ff0dd665f0c718488378b810cbb62293a0b30d6c08f675ae605c254e6c227208b19a0d171bb73
-
SSDEEP
12288:R7uM8sVm1kWF/eLJ+QlfW4MwauXWfFyDFfEWmqTqQpa4NLVZCPl:R+sVmhledMmGdu+ZqHzCPl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1116 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 1116 624 cmd.exe 29 PID 624 wrote to memory of 1116 624 cmd.exe 29 PID 624 wrote to memory of 1116 624 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RulesASAP_KOP3.iso1⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\RulesASAP_KOP3.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1116
-