Resubmissions

25/07/2024, 14:12

240725-rh7dessgkl 10

07/07/2024, 09:11

240707-k5yaps1bpa 10

Analysis

  • max time kernel
    149s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 14:12

General

  • Target

    f741b66592c42e73af7adc46815cf6183765a2fb6a5f9f96cc75eaaf7dc15402.exe

  • Size

    326KB

  • MD5

    f088b0524afae3a92f571c4cc390d064

  • SHA1

    4945a0a0f226aac22992e4960d1f764904c509d2

  • SHA256

    f741b66592c42e73af7adc46815cf6183765a2fb6a5f9f96cc75eaaf7dc15402

  • SHA512

    b41b13f7c3b8679371f1effbdb0f64e9466a549cda4116e058f18892e0883819fa797ac57c1eaad56db4f71dee39fa3ff107d12d656c40005813b1621820057e

  • SSDEEP

    6144:QXqpIW/yoztkBUPeuLWzWDj4IByRuE3AzJNxRbIIJE:qq2W/7RkB6qGKuE6NxBIIJE

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Renames multiple (8537) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 39 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f741b66592c42e73af7adc46815cf6183765a2fb6a5f9f96cc75eaaf7dc15402.exe
    "C:\Users\Admin\AppData\Local\Temp\f741b66592c42e73af7adc46815cf6183765a2fb6a5f9f96cc75eaaf7dc15402.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:828
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1092
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4e8
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2912
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\vcredist2022_x64_001_vcRuntimeAdditional_x64.log
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3364
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\ReadMe.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:5220

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini

      Filesize

      1KB

      MD5

      4cf9bc0ed4f82f99f7df0e4d4728fff8

      SHA1

      77a3e8c08f966d1b8e5042735fd86b9cfc54a436

      SHA256

      dd52f06d19ae946aeb32562c1f11d9a07ca9b77475d1a0b2c5834cbd096b4862

      SHA512

      c5b7dfb9031014e7cc9397c886570f1b6950f510281e1fc2dbccd94666b0b93ff8c0115c3f83c5c165bd61fa5823e4a3d33dde62ee6a25719d91527a1b865a05

    • C:\ReadMe.txt

      Filesize

      190B

      MD5

      c6d16a305a09f08f3d2d43f44a524dc4

      SHA1

      60478c2a5497734499a8455b5022845a6f6d4049

      SHA256

      95df1ea5b53097e45e438c61fc2e5d081ca5784271edb17ee8a4cf863e79797d

      SHA512

      e6d71e52e2d614b210e3c1acd5f379e45f9f233c1201835d1e10a3719b4be242f937f52426f3ef54f0744ac531a3384e1617058d521999e7ed5afa834083d67f

    • memory/828-0-0x00000000001D0000-0x00000000001FC000-memory.dmp

      Filesize

      176KB