Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 11:40

General

  • Target

    3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe

  • Size

    326KB

  • MD5

    2639ec5825ff4ff231b5c50cd50b9514

  • SHA1

    9e13e135171f42bd466f26242b320763bbfcfba2

  • SHA256

    3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545

  • SHA512

    207f3fa4577326df71c21a5b871b2e4778c6486ca4f289495b8b391314b2c9fc507c883615870c3cd8c1fe832918f06e375ce16d04f213048312e7d70a8d5dda

  • SSDEEP

    6144:PXqpsIPCYYNUBEP+abW67Dz4HFgnPOAzu0bD7P9YJJE:PqaIPbyUBWa5CPO0bPP9SJE

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Renames multiple (8500) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 39 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe
    "C:\Users\Admin\AppData\Local\Temp\3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini

    Filesize

    1KB

    MD5

    547bcce3d4c703347ccb6a3168f62bfa

    SHA1

    cb95a4b2558c052aafc9b686166c5c22b8ebed26

    SHA256

    1775dec5d479ba0c0b9b5e821d5665f6e9eb58b11bf3a9c6a64e05b12520a197

    SHA512

    f17c16782d9c09714fbfc8f63e6706546764c3ed00cfec4bd54747ef4d3bfadf703b16aefba96f3e5b8962e7c99c18b2bad4e80da9227d891e4ae23ff2b9e934

  • memory/2948-0-0x00000000001D0000-0x00000000001FC000-memory.dmp

    Filesize

    176KB