Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2024 11:35

General

  • Target

    DictionaryZipped.txt

  • Size

    24KB

  • MD5

    b24e9bda920adc4bb77a84909e860cc5

  • SHA1

    5a2649c8a90941297b7df9a1bf567c287c1e5425

  • SHA256

    15378016478e94a096afddb98d83dc1c4940cb4796a26325018b9f4ac75760d2

  • SHA512

    d8b8c6aefdc219a9bde6d30a5c8a53a3fbca11a24a0624cb211b0ddad88ec2a9e6464e8360690afd9863d497c5ff70fccd968b3b799c230c44b2894234c31e80

  • SSDEEP

    384:rvAOkIxiTbYs3exAv5xvIIsoQLItwzLkc1uobHul+vZW943+Q+8+pEr1:9LwTbYgexAvzw4bkLkcH0+hp7+k1

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\DictionaryZipped.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads