Overview
overview
10Static
static
Invoi_PDF#2092.iso
windows10-2004-x64
3Invoi_PDF.lnk
windows10-2004-x64
3cadets/fid...op.cmd
windows10-2004-x64
1cadets/inclines.txt
windows10-2004-x64
1cadets/kid...ily.js
windows10-2004-x64
1cadets/located.png
windows10-2004-x64
3cadets/obtaining.txt
windows10-2004-x64
1cadets/oiliness.txt
windows10-2004-x64
1cadets/per...ly.txt
windows10-2004-x64
1cadets/placeable.png
windows10-2004-x64
3cadets/pos...es.dll
windows10-2004-x64
10cadets/suggested.png
windows10-2004-x64
3cadets/teensy.txt
windows10-2004-x64
1Analysis
-
max time kernel
75s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
Invoi_PDF#2092.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Invoi_PDF.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
cadets/fidgetingPawnshop.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
cadets/inclines.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cadets/kidskinHandily.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
cadets/located.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
cadets/obtaining.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
cadets/oiliness.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
cadets/perpendicularly.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
cadets/placeable.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
cadets/possibilities.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
cadets/suggested.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
cadets/teensy.txt
Resource
win10v2004-20220901-en
General
-
Target
cadets/teensy.txt
-
Size
192KB
-
MD5
91dcfc81b6afe9d8222f142af378bad1
-
SHA1
6e592f144d66d267b3ef4076f30503662c191cd8
-
SHA256
c72b485d6f09a322acbd1789ef3c445f205e9e814bfde822df66a37e173cb519
-
SHA512
feb776dcdb1c1cdd42dc4bf87cbe0786c3c2f8ee77215bb6175fbc48dcb59c1cec8eed7b1834f96aa22440f2f8642ed4009db9858224e6e59d69bde7a5f81fde
-
SSDEEP
6144:2NwlTSpTSnwlTTD3wgN7TmRkqEEwFHwuSOwWgFnwlX8wwtj:wwtwdwYMwlwROwTwGw+j
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3364 NOTEPAD.EXE