Resubmissions

22-05-2024 21:01

240522-ztx8wsgd81 8

22-05-2024 20:40

240522-zft93sfh59 1

22-05-2024 20:18

240522-y3hn5afa5s 8

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:01

General

  • Target

    files.txt

  • Size

    1KB

  • MD5

    cee6a1e9a3f91d413922d66f94429554

  • SHA1

    f1329d2c1bf4e6081f7e0fe8f9def79faba1023b

  • SHA256

    74f2dd26c458b9388881c0f45e0080611bbe8b794bbd605a79cf919ee31d9cb8

  • SHA512

    15b6e8cf38b932a8beb15bd7ea21baf3824c60a5b4d412eae2d178995b0e297de5504bd8521c6720296711c77fac46ff8f8ad35b8aaffafe83d83eb6032f5c39

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\files.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads