Resubmissions

05-06-2022 15:10

220605-sj6zqabfd5 8

02-06-2022 19:49

220602-yjvvcabad9 10

Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-06-2022 19:49

General

  • Target

    x.txt

  • Size

    289B

  • MD5

    072009e7e44a2a75b9c9398e5263cc04

  • SHA1

    07649472a1ab42cf1d29de040f3adf1cd7bb21fa

  • SHA256

    56e9baf765a043889efa1695e48d342057bb3e70adc723cbd96135fe1764fd3e

  • SHA512

    b67c426b9f4e0d070c526e1c060d271c3875f0f9ba58e782ff78aec02b3a7f2a34b551f43e97947fecebca3ea337e08eedcc29a4583a3ad6d42e74d60bb7be6d

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\x.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-54-0x000007FEFBC11000-0x000007FEFBC13000-memory.dmp

    Filesize

    8KB