Resubmissions

02-08-2024 19:42

240802-yeqptsxcrp 9

02-08-2024 19:39

240802-ydek6sscra 3

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 19:39

General

  • Target

    Language/az.txt

  • Size

    9KB

  • MD5

    81b732a8b4206fb747bfbfe524dde192

  • SHA1

    4d596b597cf25ff8d8b43708e148db188af18ef9

  • SHA256

    caec460e73bd0403c2bcde7e773459bea9112d1bfacbe413d4f21e51a5762ba6

  • SHA512

    8667bff18a26fe5b892ecfdc8d9c78ecc5659b42c482e1f9e6eb09f7cf5e825584851cd4e9a00f5c62d3096d24cc9664f8223c036a4f2f6e9c568269b2fbb956

  • SSDEEP

    192:iQMqAQbtI+SY+oEDQM0ia9mh/Vg/HksiM0ko3gvje2ojVPC1vUZzxEBa2U:i7SrSYzEsMDV4P0kggv6pCahxEwr

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Language\az.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads