Resubmissions

02-02-2024 14:59

240202-sc227aggd2 7

02-02-2024 14:53

240202-r9dkesahcq 3

Analysis

  • max time kernel
    466s
  • max time network
    474s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 14:59

General

  • Target

    Disk1/0x0409.ini

  • Size

    21KB

  • MD5

    a108f0030a2cda00405281014f897241

  • SHA1

    d112325fa45664272b08ef5e8ff8c85382ebb991

  • SHA256

    8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

  • SHA512

    d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

  • SSDEEP

    384:CTmyuV//BiTbh/YgAwC2WrP2DBWa/Oa0Mhs+XVgv:CT6V//BiXh/t/lWr0aa0Mhs+XVgv

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Disk1\0x0409.ini
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads