Resubmissions

02/08/2024, 19:42

240802-yeqptsxcrp 9

02/08/2024, 19:39

240802-ydek6sscra 3

Analysis

  • max time kernel
    91s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 19:39

General

  • Target

    Language/ca.txt

  • Size

    9KB

  • MD5

    1657720023a267b5b625de17bf292299

  • SHA1

    0045dfafafb9c9058f7d0d6a6c382959c5a67fe0

  • SHA256

    ed8748da8fa99db775ff621d3e801e2830e6c04da42c0b701095580191a700a6

  • SHA512

    e7998f6484370e53db9cdc80cd55070e408aa93161fa59e48c6e2b26462d6d3eb774c011212840ef1eb821a5ba067b6706cd4ca2be00619aecd24a11e6ca136f

  • SSDEEP

    192:iDNC5+TqX1VvwqqNZ3SE/ye3TmsZmpk0R6PeNJH+L/w3M0ZeDwDWBszBUe:iBhuX1OqqNZ39BDmfHB4yXBUe

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Language\ca.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:4756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads