Resubmissions

25/07/2024, 14:13

240725-rjwy3ssgnl 10

25/06/2024, 17:30

240625-v25wgswcjj 10

Analysis

  • max time kernel
    35s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 17:30

General

  • Target

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe

  • Size

    110KB

  • MD5

    addafbaa977dde4a5207b3abc3caf24c

  • SHA1

    9df19b7170ecab89f87ba22f2700e5534eda297b

  • SHA256

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087

  • SHA512

    f0777595040f4c50abd8db0943f1728b145bee1bdbec58ab2040d7dae8677479b0ecaccf0a7ab311b9374ccd128148d1ae6c20cb7fec2f28ff4f7049b2212f9e

  • SSDEEP

    3072:aagoUqGqGRdi2RcKKmLgGFuCp+8rWgGbmOGgkF9x+vUABeZhaj:fCZPnFj+2OC+07K

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (2463) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe
    "C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:1208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini

    Filesize

    1KB

    MD5

    b2db9caad8ece44e57a8378a2f78be2e

    SHA1

    e37cb20c4ebda0a92feb9293a2965073d761c9d4

    SHA256

    182a12353e93b638a47afae9cb42970b6c6dd0fc76ea896c38d2e05c81de84cd

    SHA512

    f98a0afe3a8bcf3fe6d0c5abfc65b87ef2ecded43558706e0351b82863c7c1cf646576e3b76ba36eac41f47f09870d6cc4371d98493259196f6378745a39b4c6

  • memory/1208-0-0x0000000000210000-0x000000000023C000-memory.dmp

    Filesize

    176KB