Resubmissions

30-09-2024 02:57

240930-dflr2svapl 3

30-09-2024 02:54

240930-dedp2sydrf 3

30-09-2024 02:49

240930-dbcnksycnh 3

30-09-2024 02:46

240930-c9pkcsybqb 3

Analysis

  • max time kernel
    27s
  • max time network
    142s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-09-2024 02:46

General

  • Target

    Balatro.v1.0.1c.Beta/Balatro/readme.txt

  • Size

    4KB

  • MD5

    05cb183078280382adf73bfc14ad9c02

  • SHA1

    a3b8f8c84bc7a12514f5521958bc5e43b9abf4cd

  • SHA256

    9cf6172876b85771d0dd6463bd92786b77bd40510d817eceaf5ff459611ce225

  • SHA512

    332ce80a0c78bb2123af189be75c1d6b984a5ee7ce5c5f0c9503ccd17e2d61c9b8870d3ca34277460c6a1f3502dd564cf832a9d0b95ac8d384bdb89a6c838add

  • SSDEEP

    96:Ltg9ZT4kpgOq7veiE9aHoemrjDtAG1GpGT2QGTHG85/GTHG8QJOuf1:LSZUzvMaIekjDtAwgy2QyHT/yH6JD1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.1c.Beta\Balatro\readme.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Balatro.v1.0.1c.Beta\Balatro\readme.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:3464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads