Resubmissions

12/06/2024, 22:11

240612-135j1asekc 10

12/06/2024, 20:56

240612-zq6qvstekp 10

28/05/2024, 13:15

240528-qg9aysfh38 10

27/05/2024, 20:52

240527-zn2dcshf8x 10

Analysis

  • max time kernel
    81s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 22:11

General

  • Target

    2TXt7S.exe

  • Size

    326KB

  • MD5

    21413e789eea9d581d047df32fad7fa7

  • SHA1

    c361103da37aff0216281781dff09fa5c079864b

  • SHA256

    7bc87a26137cc07cabf31e6e4bcd0e514846b5dd727a29132919f2e6b317cde8

  • SHA512

    cd6bd0f43b0385a392395add3108134d8aeb62cea3ed470ddfeea66ac096cc6de5e85bc2dda3798a13437ae4b6c38580a3b2e24143db1835c88d268b2ec570c4

  • SSDEEP

    6144:fXqpIW/yostkBUPSuLWT9Dj4IByRuE3AzJNxRGI20JE:/q2W/7+kBuqjKuE6NxAn0JE

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (4674) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2TXt7S.exe
    "C:\Users\Admin\AppData\Local\Temp\2TXt7S.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:688
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:8072
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:39180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-4204450073-1267028356-951339405-1000\desktop.ini

      Filesize

      1KB

      MD5

      4e3d140ad66aebadb6306d222c74e4f2

      SHA1

      83f4e87c87f7fe2eb82e6a85439d01ccdc4020cb

      SHA256

      46f70abecce0f62d69fd25fb6aa2d364a3dd329866ef81e5358bb92e4b302331

      SHA512

      049657460db4240a0f6cf66a2a1fed8a2989d040e80fad74d1a143779592f5c258d5f883dff0c6be70527a740555d0016fe035e3b1d7ebdeed5a377cba6f3d5a

    • C:\$Recycle.Bin\S-1-5-21-4204450073-1267028356-951339405-1000\desktop.ini

      Filesize

      1KB

      MD5

      938a56fa0fdbbc62a899d3166a364471

      SHA1

      6e4d85f54e59a8c6b1e32673f485f99d4d3049b6

      SHA256

      840ee33e1e32a4bfba0699fdc86489c96ccf8c84a6014e42c3e79b85d4189bf9

      SHA512

      2df17cd280cd3d6809bee61fb477c44c8be89bf4001f8b04e4361e543cd5b698aa51820c93a1d04448502404eb9c440030f14bdc49ae3c5a2dca295bb8a4bb8f

    • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

      Filesize

      64KB

      MD5

      d2fb266b97caff2086bf0fa74eddb6b2

      SHA1

      2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

      SHA256

      b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

      SHA512

      c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

    • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

      Filesize

      944B

      MD5

      6bd369f7c74a28194c991ed1404da30f

      SHA1

      0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

      SHA256

      878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

      SHA512

      8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

    • memory/688-0-0x0000000000B10000-0x0000000000B3C000-memory.dmp

      Filesize

      176KB

    • memory/8072-6975-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6976-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6974-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6973-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6965-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6964-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6963-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6977-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6978-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB

    • memory/8072-6979-0x000002819A5E0000-0x000002819A5E1000-memory.dmp

      Filesize

      4KB