Overview
overview
3Static
static
1Browser/cc's.txt
windows7-x64
1Browser/cc's.txt
windows10-2004-x64
1Browser/cookies.txt
windows7-x64
1Browser/cookies.txt
windows10-2004-x64
1Browser/history.txt
windows7-x64
1Browser/history.txt
windows10-2004-x64
1Browser/passwords.txt
windows7-x64
1Browser/passwords.txt
windows10-2004-x64
1Clipboard/...rd.txt
windows7-x64
1Clipboard/...rd.txt
windows10-2004-x64
1Common Fil...wda.js
windows7-x64
3Common Fil...wda.js
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
Browser/cc's.txt
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Browser/cc's.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Browser/cookies.txt
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Browser/cookies.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Browser/history.txt
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Browser/history.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Browser/passwords.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Browser/passwords.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Clipboard/clipboard.txt
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Clipboard/clipboard.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Common Files/ /AWDawdwadwda.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Common Files/ /AWDawdwadwda.js
Resource
win10v2004-20240802-en
General
-
Target
Browser/history.txt
-
Size
8.8MB
-
MD5
f1d067c28a6fa18dd540f250feaf1222
-
SHA1
eca2fdd1e208b8fb69457eca647c0428ad4d28aa
-
SHA256
a533edf648951a5e8ce70a4bf0fcf9f926b1122ea48759fae275a1a5e46a6413
-
SHA512
c378721b4165e9e512cb882cab80411439e998070e495c47a6dcd69530c884297abf87da6e24e2885ce3bea8a0e0732b117f73156b0e7c07e42901d55221aa40
-
SSDEEP
49152:dRgoz5v51C94zGronHo/8lELOCw58fxFcySRcHrxXzTrpKV6VNEu0OiEquhuyan9:1DgDPPlyPlyPlKPlsPlq
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3416 NOTEPAD.EXE
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Browser\history.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:3504