Overview
overview
10Static
static
Invoi_PDF#2092.iso
windows10-2004-x64
3Invoi_PDF.lnk
windows10-2004-x64
3cadets/fid...op.cmd
windows10-2004-x64
1cadets/inclines.txt
windows10-2004-x64
1cadets/kid...ily.js
windows10-2004-x64
1cadets/located.png
windows10-2004-x64
3cadets/obtaining.txt
windows10-2004-x64
1cadets/oiliness.txt
windows10-2004-x64
1cadets/per...ly.txt
windows10-2004-x64
1cadets/placeable.png
windows10-2004-x64
3cadets/pos...es.dll
windows10-2004-x64
10cadets/suggested.png
windows10-2004-x64
3cadets/teensy.txt
windows10-2004-x64
1Analysis
-
max time kernel
90s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 13:52
Static task
static1
Behavioral task
behavioral1
Sample
Invoi_PDF#2092.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
Invoi_PDF.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
cadets/fidgetingPawnshop.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
cadets/inclines.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
cadets/kidskinHandily.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral6
Sample
cadets/located.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
cadets/obtaining.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
cadets/oiliness.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
cadets/perpendicularly.txt
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
cadets/placeable.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
cadets/possibilities.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral12
Sample
cadets/suggested.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
cadets/teensy.txt
Resource
win10v2004-20220901-en
General
-
Target
cadets/obtaining.txt
-
Size
162KB
-
MD5
243d3e3702033ad37f46d10121a45cfe
-
SHA1
ea281a5056787e23b4559a24344f50ae7b32ca30
-
SHA256
50a58c8736d08dbef76d1ca22761a3ccadd9250c75ccf0235ea4b854ed467045
-
SHA512
28b4e88bd1aa8c594edb4b4a437f886c046241a4780ab922a8c406d743656970d5dd724bcfd6312bb7e003f6de9854a6e1da191f956bdff6e7def6127f026c83
-
SSDEEP
3072:DZOrwZw3ztSBBTSBgSnwCtQu/1ZOK1ZOAjOj/tQTj/tQtH51ZOebZO04SJASoHHh:D8wZwxS/TSCSnwCOo3EOnOtHjdGSmSoh
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1196 NOTEPAD.EXE