Analysis

  • max time kernel
    77s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 14:19

General

  • Target

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe

  • Size

    110KB

  • MD5

    addafbaa977dde4a5207b3abc3caf24c

  • SHA1

    9df19b7170ecab89f87ba22f2700e5534eda297b

  • SHA256

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087

  • SHA512

    f0777595040f4c50abd8db0943f1728b145bee1bdbec58ab2040d7dae8677479b0ecaccf0a7ab311b9374ccd128148d1ae6c20cb7fec2f28ff4f7049b2212f9e

  • SSDEEP

    3072:aagoUqGqGRdi2RcKKmLgGFuCp+8rWgGbmOGgkF9x+vUABeZhaj:fCZPnFj+2OC+07K

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Renames multiple (7550) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 13 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe
    "C:\Users\Admin\AppData\Local\Temp\dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini

    Filesize

    1KB

    MD5

    24f7b2170653e1fa8926cf632aeb0db8

    SHA1

    80c74db88a43c8bb95bb9ef43f0011229532917a

    SHA256

    1e316b3fc1cb34d32616bed3a591c3a4acfe93956c1fed9b829797b5a9e041cb

    SHA512

    23f58b851359677f43b97a41cda3c51f2c7972e44bfdc02fe896445fd33805e1ef033126e59a873939dae74f325959771e9f2be94cb8b624e95c3834fe92d6a4

  • memory/2332-0-0x0000000000270000-0x000000000029C000-memory.dmp

    Filesize

    176KB