Overview
overview
10Static
static
Launcher.zip
windows7-x64
1Launcher.zip
windows10-2004-x64
1Launcher/INFO.txt
windows7-x64
1Launcher/INFO.txt
windows10-2004-x64
1Launcher/Opener.bat
windows7-x64
7Launcher/Opener.bat
windows10-2004-x64
10Launcher/zzen.zip
windows7-x64
1Launcher/zzen.zip
windows10-2004-x64
1bypasser
windows7-x64
1bypasser
windows10-2004-x64
1gpasser.cmd
windows7-x64
1gpasser.cmd
windows10-2004-x64
1ks.vbs
windows7-x64
1ks.vbs
windows10-2004-x64
1Analysis
-
max time kernel
22s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-10-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Launcher.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Launcher/INFO.txt
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Launcher/INFO.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Launcher/Opener.bat
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
Launcher/Opener.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Launcher/zzen.zip
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Launcher/zzen.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
bypasser
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
bypasser
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
gpasser.cmd
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
gpasser.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ks.vbs
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ks.vbs
Resource
win10v2004-20220901-en
General
-
Target
Launcher/INFO.txt
-
Size
3KB
-
MD5
ff5a8524d68dfeaa43817dd615fc978b
-
SHA1
d3e777906f9c8ef420a16dcea4df1b79bbdc9a45
-
SHA256
a17ed8a04c68bc3de4cc996feaf103babf9e2bd77f11af281d0fdaaa8075b994
-
SHA512
f3bbf7d83ce72d682f81b434a02a62018054c52426eff25ba2c513e0dafaaacd63bf2cb2714106453e2fee659354d38b17f6c6f3442d4779fe357e0c4677fc6d
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1952 NOTEPAD.EXE
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1952-54-0x000007FEFC421000-0x000007FEFC423000-memory.dmpFilesize
8KB