Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2024 11:54

General

  • Target

    6.txt

  • Size

    11.0MB

  • MD5

    43592ac66cf0bd706883472fde082e14

  • SHA1

    926d2be96090e073e7ee0bdd5817c69c2e3ba0ef

  • SHA256

    03beda110a6494ea0e1b2b4100689312d24046f712c500d158bb8b95fbfdbb3d

  • SHA512

    2e1349f6bc43d4c1850b757528dcb3debec45c8fa2006968e8dc3b40fedec9a3d5dcc103d7b934f5a1c4dfe0f40c6b55b81b679afc68948f4eadf27aedde8f13

  • SSDEEP

    196608:Pp4ZT9inixRwH+7qos+k1nsWwxWJtoli12tUJKyhoms0J5G+2R+6SJS1/:6ZT8nixyH+7Xs+kZsWIWJtbgQT250eq4

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\6.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads