Resubmissions

09-05-2023 00:46

230509-a459tade92 7

09-05-2023 00:38

230509-ay2dnsde74 9

Analysis

  • max time kernel
    27s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2023 00:38

General

  • Target

    c.txt

  • Size

    23KB

  • MD5

    e91f05b459e3df011e8afd1f35eebffc

  • SHA1

    425504c4e6eab03f91b07740b75989ccaab1fa67

  • SHA256

    80d2c6b4174b91b2b2b5a189726b8e1d715745e2b8064a1a18663936187f62b0

  • SHA512

    13e75c3fee33b78c2d61b2870c856e45f2f9ee208593720ccf7895cd759694762161a086f18f94701e0fc8f0a48c0ca798fdd81c939263964e7a149eb9dacba7

  • SSDEEP

    384:MOQ/cBozUqKi8DsHqjFnKNSTYY0Rez/5QLkWN6vXiAq+7UYaiaeOaIfxVh+bJ/ja:i/vUqKFsKw0h1QL7Qvy8UYP6aIfxVgbI

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\c.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads