Resubmissions

02-10-2022 15:25

221002-stk51adhdn 10

30-09-2022 13:52

220930-q6sdqsdga9 10

Analysis

  • max time kernel
    78s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 15:25

General

  • Target

    cadets/teensy.txt

  • Size

    192KB

  • MD5

    91dcfc81b6afe9d8222f142af378bad1

  • SHA1

    6e592f144d66d267b3ef4076f30503662c191cd8

  • SHA256

    c72b485d6f09a322acbd1789ef3c445f205e9e814bfde822df66a37e173cb519

  • SHA512

    feb776dcdb1c1cdd42dc4bf87cbe0786c3c2f8ee77215bb6175fbc48dcb59c1cec8eed7b1834f96aa22440f2f8642ed4009db9858224e6e59d69bde7a5f81fde

  • SSDEEP

    6144:2NwlTSpTSnwlTTD3wgN7TmRkqEEwFHwuSOwWgFnwlX8wwtj:wwtwdwYMwlwROwTwGw+j

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) ⋅ 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\cadets\teensy.txt
    Opens file in notepad (likely ransom note)
    PID:3140

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

          Discovery

            Execution

              Exfiltration

                Impact

                  Initial Access

                    Lateral Movement

                      Persistence

                        Privilege Escalation

                          Replay Monitor

                          00:00 00:00

                          Downloads