Resubmissions

28/05/2024, 13:25

240528-qn2jpagc45 10

21/12/2023, 15:14

231221-smbb8aahaq 10

Analysis

  • max time kernel
    97s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 13:25

General

  • Target

    762bb8a7209da29afb89f7941ae1c00a04cf45a144c6c5dddcfa78ff0d941539.exe

  • Size

    458KB

  • MD5

    8177fcfd49b44e0eff98320b0a713ff8

  • SHA1

    8a40c9b2c5b0902d9dc0f159def55eea94063b1e

  • SHA256

    762bb8a7209da29afb89f7941ae1c00a04cf45a144c6c5dddcfa78ff0d941539

  • SHA512

    5821cc4bae9b43772c8253cbd9feac353d4b44b5ad3e9d786c96d3e4ec2147a7787115300658f10a22cc46bbc3032e7ecaf38d84f5167040775135d314e4de5a

  • SSDEEP

    6144:f7M6Yn6fGlV0okVP3Z4FQmFKMUhhtpyr81fhKUqmLzmZuGVPVElK4p+:fsflV0pVP3aBcJyrs3qPZuocp+

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (7924) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 13 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\762bb8a7209da29afb89f7941ae1c00a04cf45a144c6c5dddcfa78ff0d941539.exe
    "C:\Users\Admin\AppData\Local\Temp\762bb8a7209da29afb89f7941ae1c00a04cf45a144c6c5dddcfa78ff0d941539.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini

    Filesize

    1KB

    MD5

    4f8d70a4a4fcc5322e0b5fc8dab06cbe

    SHA1

    a0b2d6baa323481519805778846a803d28e4a767

    SHA256

    3aaa2854954f8c7bad09186c42beeadcd5ca94a251e8f71c9bcdf4838fe4c5ff

    SHA512

    0e0b1d2edb8823c6072743520c6aeb2342605015ece34b0a9614dbb89c58242614e91312d8364bf61c3d5a3388c624ecc6f474fd7033c4f9013d36ce2e6146ce

  • memory/2860-0-0x0000000000160000-0x000000000018C000-memory.dmp

    Filesize

    176KB