Analysis

  • max time kernel
    96s
  • max time network
    133s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-08-2024 21:06

General

  • Target

    MailRanger/socks4_proxies.txt

  • Size

    15KB

  • MD5

    6e00109cfc1675d5de825f1b57f8f8ef

  • SHA1

    d23c23d948f47d69fb298200bfcf6c8849d37488

  • SHA256

    a003ef5204817b8c9249cdaa949aa87bdc55315afba57ec098cdee8c9870040d

  • SHA512

    822de0e7281e4734a5297abb9eff77ef76e6e18cc93fb3edf556c9231b5608acbae20e44760dcaefb549944d13b62a446059f889e54de7fbc0428677d1be14aa

  • SSDEEP

    192:cP3YMK5j88KaB+ZeQV7QA7mmrF0xpV96/Q56iDVx4y6siQJnTt0Oh8WCedl8QMH0:cPETy6D5pZzbxqr4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\MailRanger\socks4_proxies.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\MailRanger\socks4_proxies.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads