Resubmissions

23-02-2024 11:52

240223-n18gnafd9v 10

23-02-2024 08:58

240223-kxe46aea3y 10

Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 11:52

General

  • Target

    Resource/TypeSupport/Unicode/Mappings/win/CP1257.txt

  • Size

    9KB

  • MD5

    002134c7ea7f619246bbf445caad9f08

  • SHA1

    def97351b77ebf6210b6bfb69b8bc3a4f9a64c36

  • SHA256

    7cb16a0b949f8573b06f22f091c44a1ea251cc9904591fceb2743475302c4640

  • SHA512

    95e4620258b0189b993bb56f2219f73d84145bd8e5b45f9ad70899d8da0e742bb3ead8697e5335e4de895bed925f6212d96f813b0ce9383ae42a967cca2730ca

  • SSDEEP

    192:BPJVb+Mu1eIqY/tJVLTjbew68i/vgIey4tvPhSiY+21KBrNbxlv0:BT3+qw7VLTjbew9Wo77A

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Resource\TypeSupport\Unicode\Mappings\win\CP1257.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads