Resubmissions

18/04/2024, 09:57

240418-lzcx9ahg47 7

18/04/2024, 09:53

240418-lwy2baah9w 8

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 09:53

General

  • Target

    DeepwokenMaster/configs/CUSTOMAP.txt

  • Size

    36KB

  • MD5

    e4f35f36eda4eba87a1e9635a0e4a487

  • SHA1

    459225cd61a70cdbfc3f6390b47a7292eeb71d39

  • SHA256

    785c5a6727f8ecd3ac60da0baf00974abe2119aa39dd11de3960db47e61bfb00

  • SHA512

    38fdc9630045c9c9f16c2034357c8c5fbcba4d72deaf75306c6e843c7355a958c78ed527773183f36b2ab21de47661d2358261a217d3ce45a05cf7b3b72f35a6

  • SSDEEP

    768:rZK8pB7LnKiAET7UIQ2dHEEQKx8Qh/c/MBUuVGFrPCwn/ERb8DcR/ML9GTRzvvIZ:rZK8pB7LnKibT7UIQ2dkEQKx8Qh/c/M6

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\DeepwokenMaster\configs\CUSTOMAP.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads