Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
CREAISO.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CREAISO.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mkisofs.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
mkisofs.exe
Resource
win10v2004-20241007-en
General
-
Target
CREAISO.bat
-
Size
178B
-
MD5
7f117556539267e0a120f592ca05cce8
-
SHA1
ebb9e02f85e65b6eb6f893a4b10327dfc8891423
-
SHA256
e013877a0c7e2238f3939a819f5e4cfe901c6c1575bdc0f55b8bd0bba6b2a4a3
-
SHA512
8080a631a73b550ce687255b1fac40599e3e507a9f12eeda75497d8db88a099ac2bddefd478ac6839bf84611afbc4f4e7f19c6ef91fc5a13873431d60f608a93
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mkisofs.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 4804 220 cmd.exe 86 PID 220 wrote to memory of 4804 220 cmd.exe 86 PID 220 wrote to memory of 4804 220 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\CREAISO.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\mkisofs.exemkisofs -r -b isolinux.bin -boot-info-table -no-emul-boot -boot-load-size 4 -o ../BurnMe.iso .2⤵
- System Location Discovery: System Language Discovery
PID:4804
-