Resubmissions

09-05-2023 00:46

230509-a459tade92 7

09-05-2023 00:38

230509-ay2dnsde74 9

Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2023 00:38

General

  • Target

    c.txt

  • Size

    23KB

  • MD5

    e91f05b459e3df011e8afd1f35eebffc

  • SHA1

    425504c4e6eab03f91b07740b75989ccaab1fa67

  • SHA256

    80d2c6b4174b91b2b2b5a189726b8e1d715745e2b8064a1a18663936187f62b0

  • SHA512

    13e75c3fee33b78c2d61b2870c856e45f2f9ee208593720ccf7895cd759694762161a086f18f94701e0fc8f0a48c0ca798fdd81c939263964e7a149eb9dacba7

  • SSDEEP

    384:MOQ/cBozUqKi8DsHqjFnKNSTYY0Rez/5QLkWN6vXiAq+7UYaiaeOaIfxVh+bJ/ja:i/vUqKFsKw0h1QL7Qvy8UYP6aIfxVgbI

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\c.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads