Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 15:03

General

  • Target

    Browser/history.txt

  • Size

    8.8MB

  • MD5

    f1d067c28a6fa18dd540f250feaf1222

  • SHA1

    eca2fdd1e208b8fb69457eca647c0428ad4d28aa

  • SHA256

    a533edf648951a5e8ce70a4bf0fcf9f926b1122ea48759fae275a1a5e46a6413

  • SHA512

    c378721b4165e9e512cb882cab80411439e998070e495c47a6dcd69530c884297abf87da6e24e2885ce3bea8a0e0732b117f73156b0e7c07e42901d55221aa40

  • SSDEEP

    49152:dRgoz5v51C94zGronHo/8lELOCw58fxFcySRcHrxXzTrpKV6VNEu0OiEquhuyan9:1DgDPPlyPlyPlKPlsPlq

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Browser\history.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:2672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads