Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 22:31

General

  • Target

    23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe

  • Size

    458KB

  • MD5

    0750794cd2b5823069bb9ff16ff6d2b7

  • SHA1

    466874dbf01e0bd4e99cbd6b39ae69d1023b35f2

  • SHA256

    23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c

  • SHA512

    617b9bd914f9297ff2aa6d378de3746cf1701d6dd2e575934b987dceece16329c9a7ccbb52a19022977151918dfa2304777ecf9c3cef221c16453f5b869c2d25

  • SSDEEP

    6144:7PMZuIF76gx04UVsSWvqZg8hKYjMZ8PaqzlvBaUamLzmZhLVPtkADlKHp+:7H7gx0JVsSNnkGLzHaPZhnkBp+

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (8440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 39 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe
    "C:\Users\Admin\AppData\Local\Temp\23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2085049433-1067986815-1244098655-1000\desktop.ini

    Filesize

    1KB

    MD5

    2f4754b1d296a2aff0160997e7aa1b06

    SHA1

    cd449e8a5b7df66f6dd36d58e14ebbfbae4d6058

    SHA256

    e4f7dce45e5fb58e1fc4e23551906aac876c026ddf943e16bfe5739816b01c1b

    SHA512

    b5304940b3d6cfec976e5c38641632d62014f504761da3c8302f1a39c3a258ec4295692432afa0349aeed0c3d57c99e384faeddd2da4b87f3244a9042c72315e

  • memory/2720-0-0x0000000000150000-0x000000000017C000-memory.dmp

    Filesize

    176KB