Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 22:51

General

  • Target

    6.txt

  • Size

    13KB

  • MD5

    557d6800e7d26267c7b4416d5aa514ad

  • SHA1

    2c335ad989c6490603d22bdd32f90e0407416416

  • SHA256

    53a1e26cbf460dd0b4fa92fbab79bb6adea6eee391bd2dce7b8c292577c5c91d

  • SHA512

    549db299c25ec4a48cd893b2aac04748b3b56c4ddc15e3261bebd0b5f1a174b6d5b4d36758438b79166c6144cf9afb3a2867baf214d93225d4ff455f912bcdae

  • SSDEEP

    192:uJMUqXIW2TClpMsb+QMU3tDP0corSCrVau1VCaQEhT/G3HL6gkoqa3HBK:aM//jbMsbKcBP0XS8R+3HLDk1SHBK

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\6.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:500

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads