Analysis

  • max time kernel
    103s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 12:10

General

  • Target

    3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe

  • Size

    326KB

  • MD5

    2639ec5825ff4ff231b5c50cd50b9514

  • SHA1

    9e13e135171f42bd466f26242b320763bbfcfba2

  • SHA256

    3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545

  • SHA512

    207f3fa4577326df71c21a5b871b2e4778c6486ca4f289495b8b391314b2c9fc507c883615870c3cd8c1fe832918f06e375ce16d04f213048312e7d70a8d5dda

  • SSDEEP

    6144:PXqpsIPCYYNUBEP+abW67Dz4HFgnPOAzu0bD7P9YJJE:PqaIPbyUBWa5CPO0bPP9SJE

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Renames multiple (7047) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe
    "C:\Users\Admin\AppData\Local\Temp\3f943430b49481aca6f57051ed0ced1a08038373f063afdd2423d8d72b19b545.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2990742725-2267136959-192470804-1000\desktop.ini

    Filesize

    1KB

    MD5

    836ab4619f0faf7fba4a5c4d93a82caf

    SHA1

    10e15c903b9ef81cd7c547012ac8186628b48ee7

    SHA256

    dae23f3a06a441ddadc1f8f85dc77961925a7ce96d7701a3658b67fbb0f2e6fe

    SHA512

    486841ede5e4fa259979c5cc72d19b5eebcee190fc71e7c7f54722dd7d730fad46b7dd64329fbe414ef4f15098f1b93992bb9c2af4977d1a7af2b8a4f16a9d94

  • memory/5040-0-0x00000000012D0000-0x00000000012FC000-memory.dmp

    Filesize

    176KB