Analysis

  • max time kernel
    172s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 22:31

General

  • Target

    23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe

  • Size

    458KB

  • MD5

    0750794cd2b5823069bb9ff16ff6d2b7

  • SHA1

    466874dbf01e0bd4e99cbd6b39ae69d1023b35f2

  • SHA256

    23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c

  • SHA512

    617b9bd914f9297ff2aa6d378de3746cf1701d6dd2e575934b987dceece16329c9a7ccbb52a19022977151918dfa2304777ecf9c3cef221c16453f5b869c2d25

  • SSDEEP

    6144:7PMZuIF76gx04UVsSWvqZg8hKYjMZ8PaqzlvBaUamLzmZhLVPtkADlKHp+:7H7gx0JVsSNnkGLzHaPZhnkBp+

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (1518) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe
    "C:\Users\Admin\AppData\Local\Temp\23f757c619e418b14b72299af7b77cc6939dfd2ce7d094498446f2ce4961666c.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3125601242-331447593-1512828465-1000\desktop.ini

    Filesize

    1KB

    MD5

    9ca0aaa29edcb0578cc6d0d2df8e84fb

    SHA1

    13cea0eaf711f6b61d8c78aea956f81c6efdb329

    SHA256

    33696c385d740fc19867259bf2b6dfa34d08019dfb59fd3c895bcc0624590ba3

    SHA512

    e0f51ffc9b7cf4abc8682032865e6ccd7009ab9e7a50861c8975b7b92aad5e357201d509930a566bfc5d71726b4667222ac92de100a5716f13ff36d43e8ddd30

  • memory/4408-0-0x0000000000F70000-0x0000000000F9C000-memory.dmp

    Filesize

    176KB