Overview
overview
10Static
static
ContractCopy_RL43.iso
windows7-x64
3ContractCopy_RL43.iso
windows10-2004-x64
3ContractCopy.js
windows7-x64
10ContractCopy.js
windows10-2004-x64
10addled/desertions.dll
windows7-x64
10addled/desertions.dll
windows10-2004-x64
10addled/petrifies.png
windows7-x64
3addled/petrifies.png
windows10-2004-x64
3addled/squawked.png
windows7-x64
3addled/squawked.png
windows10-2004-x64
3addled/volcanic.txt
windows7-x64
1addled/volcanic.txt
windows10-2004-x64
1data.txt
windows7-x64
1data.txt
windows10-2004-x64
1Analysis
-
max time kernel
66s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2022 18:07
Static task
static1
Behavioral task
behavioral1
Sample
ContractCopy_RL43.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ContractCopy_RL43.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ContractCopy.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ContractCopy.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
addled/desertions.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
addled/desertions.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
addled/petrifies.png
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
addled/petrifies.png
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
addled/squawked.png
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
addled/squawked.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
addled/volcanic.txt
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
addled/volcanic.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
data.txt
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
data.txt
Resource
win10v2004-20221111-en
General
-
Target
addled/volcanic.txt
-
Size
243KB
-
MD5
6b25aa529c238654ad9f5bdf21a64d41
-
SHA1
4e2d40df2e48cc072142c887f09d93fc55806844
-
SHA256
553f2d7be393b773af8b88d4b67d5df198944c63da7558a80acec1a8504822ba
-
SHA512
7e17ef586615e069bb1afe78775cfa3d7f4dc214ccdd1b05425ef04569383ab05c12b5f193e98a7d023a94f62552eed5e47d4e7587b45c5877f7555c0fea41dd
-
SSDEEP
3072:hwMNiMLgMEEIqd4YEdTMjk2GbEEvQMgnPdQZ:ikiUg3EIqdPEdTP2GbEEvQrn1QZ
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1048 NOTEPAD.EXE