Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-07-2024 20:29

General

  • Target

    Phoenix/WorkingTokens.txt

  • Size

    72B

  • MD5

    605fb0eb86149575ddf8f1dfce9fe04f

  • SHA1

    572295f401facfca5cc7eb0a8daa52da7cc0f5c9

  • SHA256

    964cf36c864eacdbdc3c4cdd1ba6870b6e6ed1abc7f358e78ba436a16a38f900

  • SHA512

    450de9b00570a44f29aff68f1b4dc2f964f69594a1a81a43edf34e5c8ca5ca82c7b02748aa7ced8726961da3f96413f941e44703628f9d9ff9a04d7662498463

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Phoenix\WorkingTokens.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2688

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads