Resubmissions

12-12-2024 17:26

241212-vzxr4atjep 1

12-12-2024 15:19

241212-sp8qhazpdp 10

Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 17:26

General

  • Target

    s.txt

  • Size

    7B

  • MD5

    af5597c29467a96523a70787c319f4db

  • SHA1

    aa5916ae7fd159a18b1b72ea905c757207e26689

  • SHA256

    cd2eca3535741f27a8ae40c31b0c41d4057a7a7b912b33b9aed86485d1c84676

  • SHA512

    4611f3df34c1afd9990007da6128c2d5c3c967909f9eed6d2dcb0161403c27ef10a5f2082723e70be79285d28a79a3bf06d9e849db285b643c8f3388840b8b5e

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\s.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:3416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads