Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2024 20:12

General

  • Target

    b.txt

  • Size

    23KB

  • MD5

    a78aec81d7753598030997ac1695a84f

  • SHA1

    c86170499cc25d2a90c09948b4b2e0e4446e3188

  • SHA256

    c813eedc4ce5c414fe2a5f7f81e6150411bbc64e6be3d58f2eea2dfc4f536954

  • SHA512

    d4fcb029639d543123d47162c2890fb0f2da2a88f758b3d584a88406b5adbe20ca0d87866dfd71851b69e37fbf36e1b2275de9a3f0e4056753cef2eb8b17b929

  • SSDEEP

    384:ML/cBozUqKi8DsHqjFnKNSTYY0Rez/5QLkWN6vXiAq+7UYaiaeOaIfxVh+bJ/jIp:w/vUqKFsKw0h1QL7Qvy8UYP6aIfxVgbk

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\b.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads