Resubmissions

02/08/2024, 19:42

240802-yeqptsxcrp 9

02/08/2024, 19:39

240802-ydek6sscra 3

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 19:39

General

  • Target

    Language/de.txt

  • Size

    9KB

  • MD5

    40ae22f5bcbeab6f622771562d584f2b

  • SHA1

    4eaa551055ccfa0076766b7bdf111de9dbcc1c82

  • SHA256

    06e5265a2b30807296480dc0b0d3a27e41f1381d61229e4eb239c4930d14a43e

  • SHA512

    581a94dc12fe48aebfd88453351697aed9de5b1decf4c5dd53cf4db38d50727d3b887498f0bee6bd532cfbdc8af7bc01fc8d58ce0c3f6fac235bc6ff3f843125

  • SSDEEP

    192:ifuT0Y83ghfM/5yT9lBJ/LQs6gIgiOvcLh3ahAHE+XAgiRTlu6ZgSboZDWUL+g9C:iG0D3ghcy7Ms6gIgiOktU+Iu6CS4L+g0

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Language\de.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:1504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads