Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 21:23

General

  • Target

    ids.txt

  • Size

    6KB

  • MD5

    714de55c05d9b9362efc45a284284ca7

  • SHA1

    741dcccffac1458a1e68c4991f2c96b9f09932f2

  • SHA256

    5e014ac2bd7449f5241ba580e2d37759f26bb81cb1213f8a30c037594a452a43

  • SHA512

    e5c2e31bf5c255623fd4007da01d223ddff60f10094243c9e9ac5105c0cff28b6c422e1f8def7e41b0a076ff4e192c5f92cd56225d88209a86ba296a8536da19

  • SSDEEP

    96:yPs3ZCUGZY69LXDah8Jm8BMXB4Ohd4lGNUIIdYrL766qNOGvyeJdbIrY9Dt1:Qs3oUGZY64XyIIwL76vyeJCrYVb

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\ids.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2040

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads