Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 20:07

General

  • Target

    ZYu4eR.exe

  • Size

    458KB

  • MD5

    a7220cc1827fca75b6e74efe59a8ea77

  • SHA1

    836c066fff10ad423134f863528f4ec3d3e95962

  • SHA256

    731457e4704d299b353e802b72a6908dfa2124cbb5130b8cb9a943c6be6bcdc6

  • SHA512

    90cda9290fbc28187da837c4829fa1cd0084a58c87e58b6ddb0e70340b334507233bc0ab2c858462824e21babaaf2118dee68513e5c87fa7126d46bce5d38b21

  • SSDEEP

    6144:4/MZO4aLcwC0IEVvO2UcxnwMSKY3m5MzrTV/yqUKmLzmZhbVPcK7lKWp+:4XiwC0pVvOwxSCirEXKPZh+Kdp+

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (2485) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ZYu4eR.exe
    "C:\Users\Admin\AppData\Local\Temp\ZYu4eR.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-919254492-3979293997-764407192-1000\desktop.ini

    Filesize

    1KB

    MD5

    b50f8be8ca36102c258c8614c3fc4fd7

    SHA1

    60ca49735da14e29ea6d0984d6a1db0050df3a18

    SHA256

    6aff302d6a296effee7e74bf4df616ba5e52a9794a4157998e24b4877ad67af8

    SHA512

    61e1caa1478428dbadabc3da9ebdf05be14a25fb26da9586bbe2aba2cff25519181f206604619d8d5802952abb8e54bb9c7795ad3588e57d053f35c0dc2d52ff

  • memory/2692-0-0x0000000002CF0000-0x0000000002D1C000-memory.dmp

    Filesize

    176KB