Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 17:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NetLimiterPatch-alpha.zip
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
NetLimiterPatch-alpha.zip
-
Size
6.3MB
-
MD5
71a7c424d208e9788bee8c79bf9edd13
-
SHA1
b049bd5021d18c150f078ac0b8cc9b4eebb0b02f
-
SHA256
17c74c3974eac7c6d84146499ad3884ff463a465f1405f5ebeba25b644f9170e
-
SHA512
7db5a0c4e2d229b312e49698427836ae3e777f660082f1b6b65a580d03ee386ae3f51f582e6ee518d1e46d38b24431c5ddbbfa100948e0609c54832397d3dc64
-
SSDEEP
196608:4BVNOvOdiQXNPGc2JFEAn2YfoN3q6NjNmGy84:4tOa92kABfMxq84
Score
1/10
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4656 NOTEPAD.EXE
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\NetLimiterPatch-alpha.zip1⤵PID:4656
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1660
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\DisconnectLock.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4656