Resubmissions

25/07/2024, 14:13

240725-rjwy3ssgnl 10

25/06/2024, 17:30

240625-v25wgswcjj 10

Analysis

  • max time kernel
    25s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 17:30

General

  • Target

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe

  • Size

    110KB

  • MD5

    addafbaa977dde4a5207b3abc3caf24c

  • SHA1

    9df19b7170ecab89f87ba22f2700e5534eda297b

  • SHA256

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087

  • SHA512

    f0777595040f4c50abd8db0943f1728b145bee1bdbec58ab2040d7dae8677479b0ecaccf0a7ab311b9374ccd128148d1ae6c20cb7fec2f28ff4f7049b2212f9e

  • SSDEEP

    3072:aagoUqGqGRdi2RcKKmLgGFuCp+8rWgGbmOGgkF9x+vUABeZhaj:fCZPnFj+2OC+07K

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (742) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe
    "C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini

    Filesize

    1KB

    MD5

    ba00e5f444c0afce93d8f9ff9c5650bd

    SHA1

    204973a77f1a7b6abdbdf1429df2f7a360389cc8

    SHA256

    9aa974cb5c57107227b952f528395fa2bbe6012b6fb9f4d560ae9a2654990ee5

    SHA512

    13c1bfd5be8c2a1aecae3b1eea4e94eedbbdaefb3045ca8c170a0537bf91f0765d18309ecfcabdea2adc2b9f706713a434d88f8000b99dfae27eac7642faf3ca

  • memory/392-0-0x0000000000C40000-0x0000000000C6C000-memory.dmp

    Filesize

    176KB