Resubmissions

12/06/2024, 22:11

240612-135j1asekc 10

12/06/2024, 20:56

240612-zq6qvstekp 10

28/05/2024, 13:15

240528-qg9aysfh38 10

27/05/2024, 20:52

240527-zn2dcshf8x 10

Analysis

  • max time kernel
    104s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 18:58

General

  • Target

    2TXt7S.exe

  • Size

    326KB

  • MD5

    21413e789eea9d581d047df32fad7fa7

  • SHA1

    c361103da37aff0216281781dff09fa5c079864b

  • SHA256

    7bc87a26137cc07cabf31e6e4bcd0e514846b5dd727a29132919f2e6b317cde8

  • SHA512

    cd6bd0f43b0385a392395add3108134d8aeb62cea3ed470ddfeea66ac096cc6de5e85bc2dda3798a13437ae4b6c38580a3b2e24143db1835c88d268b2ec570c4

  • SSDEEP

    6144:fXqpIW/yostkBUPSuLWT9Dj4IByRuE3AzJNxRGI20JE:/q2W/7+kBuqjKuE6NxAn0JE

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (7897) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 13 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2TXt7S.exe
    "C:\Users\Admin\AppData\Local\Temp\2TXt7S.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2296
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:34532
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 91E9033CD024C029AA03CFF8C0857649
      2⤵
        PID:34128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini

      Filesize

      1KB

      MD5

      29325c0d439dd82d85a757a442ed88f1

      SHA1

      f6d0b8a79c89f7bd38d0bf99a999671d2ca6fc71

      SHA256

      7d614b5ffdde7721792710e0172c3d70d7c52533c900cf528b76bcd419465210

      SHA512

      8e3abe3a319a9d59583ca1ee4e8c51da8930697bc1f4569493c9f965c34cdda158ac7b8a046cfb131d4e3f379d6fdb99690ba5a04a76a1b65ac30a9395f17f28

    • C:\Windows\Installer\MSIA718.tmp

      Filesize

      257KB

      MD5

      d1f5ce6b23351677e54a245f46a9f8d2

      SHA1

      0d5c6749401248284767f16df92b726e727718ca

      SHA256

      57cb8f01cf553c3886760180d1a74839f2f676640115504485aca9692f577acc

      SHA512

      960e90894e7bedcc89894e77e57e8ee0c99dd2c530d02665e8bbd3a1793eccc1e295c5923d1f37c757fa1158097fbaae70898c16052882d3d210c29ea801b3ba

    • C:\Windows\Installer\MSID606.tmp

      Filesize

      19KB

      MD5

      9cadbfa797783ff9e7fc60301de9e1ff

      SHA1

      83bde6d6b75dfc88d3418ec1a2e935872b8864bb

      SHA256

      c1eda5c42be64cfc08408a276340c9082f424ec1a4e96e78f85e9f80d0634141

      SHA512

      095963d9e01d46dae7908e3de6f115d7a0eebb114a5ec6e4e9312dbc22ba5baa268f5acece328066c9456172e90a95e097a35b9ed61589ce9684762e38f1385b

    • memory/2296-0-0x0000000000170000-0x000000000019C000-memory.dmp

      Filesize

      176KB