Analysis
-
max time kernel
128s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-01-2023 03:38
Static task
static1
Behavioral task
behavioral1
Sample
3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
CLFSECUR.exe
Resource
win7-20220812-en
General
-
Target
3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127.iso
-
Size
35.9MB
-
MD5
93a4fdd473320d37ae59ed875632e4ef
-
SHA1
288603f501926756c236e368a1fdc7d128f4f9a1
-
SHA256
3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127
-
SHA512
4b6a2b4120fa996c1b054f9672efb0caf2ee0c8efa1f8ed4f83830622ca1a4592851d4be9c857666bd6cb626876a333686de7d74e94c9052452582d2fb474afa
-
SSDEEP
786432:rQRwdPcRZMRDY8X9XRTuCpZD7U4qRVOtIqNi0f9jphU7oDM8ETp9an3aZ:cRwdPcRZuDYg1pZfUNRctpNi0f9dhU7L
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1196 isoburn.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1196 1388 cmd.exe 29 PID 1388 wrote to memory of 1196 1388 cmd.exe 29 PID 1388 wrote to memory of 1196 1388 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127.iso1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\System32\isoburn.exe"C:\Windows\System32\isoburn.exe" "C:\Users\Admin\AppData\Local\Temp\3dd172bf8a7e2985f8387ffc4b6f2fc3ee05435b69a43d714d3137d9a5147127.iso"2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1196
-