Analysis

  • max time kernel
    147s
  • max time network
    182s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-07-2023 08:47

General

  • Target

    BR_128.201.41.41_2023_06_22_23_48_50/cookies/Google Chrome_Default.txt

  • Size

    20KB

  • MD5

    a5a6055fe4f4f05c4924f2718371389e

  • SHA1

    5e5f197da2947e0a00c4441c5ca2aedb2b182486

  • SHA256

    424262dfceb1dcc276bbd14b1ec75aecbfac61ea3cd9ae51f0caa863efa2e77c

  • SHA512

    698fec8f59b6cb303876acf59cc6731c276981db716a2151d12a6474a5e2f08e8f181d89860716330d1db6882d2f125d54c99eaf2507fd540aac01b8378de049

  • SSDEEP

    384:dtZleawuilfh7z9ipWs9xCebdS0mjrx4rSY7bB8:/Znwu0h7z4Yeg0Wrx4rSY7bG

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\BR_128.201.41.41_2023_06_22_23_48_50\cookies\Google Chrome_Default.txt"
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:688
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1492

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads