Resubmissions
15-06-2024 17:25
240615-vzf5casdqm 315-06-2024 17:24
240615-vy3xqasdpl 315-06-2024 17:22
240615-vx1qzaycqd 4Analysis
-
max time kernel
235s -
max time network
243s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
Bruh.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Bruh.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Bruh/here.txt
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Bruh/here.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Bruh/honeypot.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Bruh/honeypot.exe
Resource
win10v2004-20240508-en
General
-
Target
Bruh/here.txt
-
Size
342B
-
MD5
3fe93af384f22a007699e783e346cf5c
-
SHA1
725d9b373f91930b994452591b254e249ba5f220
-
SHA256
4a20e3359ee4534407ab337cbeeb10a09993350169b77469cb14e776ed48fd35
-
SHA512
ff97a6dd510560abb5b04885f2acf7038d8c60ce388e7ca04a19bfe16d87b2cd109d58bbd011c63c59945614a279ded2c9e390681f2fd5bc265b2553b81fad59
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4248 NOTEPAD.EXE
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Bruh\here.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4172,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=1032 /prefetch:81⤵PID:3156