Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:07 UTC

General

  • Target

    ZYu4eR.exe

  • Size

    458KB

  • MD5

    a7220cc1827fca75b6e74efe59a8ea77

  • SHA1

    836c066fff10ad423134f863528f4ec3d3e95962

  • SHA256

    731457e4704d299b353e802b72a6908dfa2124cbb5130b8cb9a943c6be6bcdc6

  • SHA512

    90cda9290fbc28187da837c4829fa1cd0084a58c87e58b6ddb0e70340b334507233bc0ab2c858462824e21babaaf2118dee68513e5c87fa7126d46bce5d38b21

  • SSDEEP

    6144:4/MZO4aLcwC0IEVvO2UcxnwMSKY3m5MzrTV/yqUKmLzmZhbVPcK7lKWp+:4XiwC0pVvOwxSCirEXKPZh+Kdp+

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (8480) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 39 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZYu4eR.exe
    "C:\Users\Admin\AppData\Local\Temp\ZYu4eR.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:1376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-86725733-3001458681-3405935542-1000\desktop.ini

    Filesize

    1KB

    MD5

    937c48233853189d65538e21d18e26de

    SHA1

    2ecedb3185e4d7b4d7c97fcbba1ff02bd7361051

    SHA256

    b2a7a590a8b17d52d4fb7146242df571ae0c18ec5c3eb933a58233b2c216c8d6

    SHA512

    8a9540e54b64f8ec807cda13c79c6c855abc9d0b12f129dd30ef4ab1207fbf8bb77dba8cc6223e4d3cdde46961b9856e3c012eb587cb75bdc56b0a65776bb7a7

  • memory/1376-0-0x0000000000170000-0x000000000019C000-memory.dmp

    Filesize

    176KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.