Overview
overview
10Static
static
1SystemLogs (1).zip
windows11-21h2-x64
4Browsers/C...RA.txt
windows11-21h2-x64
3Browsers/P...ds.txt
windows11-21h2-x64
3Epic/GameU...gs.ini
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...ts.nbt
windows11-21h2-x64
3Steam/Dial...ig.vdf
windows11-21h2-x64
3Steam/Dial...20.vdf
windows11-21h2-x64
3Steam/Dial...80.vdf
windows11-21h2-x64
3Steam/avat...08.png
windows11-21h2-x64
Steam/config.vdf
windows11-21h2-x64
3Steam/copl...08.vdf
windows11-21h2-x64
10Steam/libr...rs.vdf
windows11-21h2-x64
3Steam/loginusers.vdf
windows11-21h2-x64
3Steam/remo...ts.vdf
windows11-21h2-x64
3Steam/stea...nifest
windows11-21h2-x64
3Analysis
-
max time kernel
434s -
max time network
440s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2025 22:27
Static task
static1
Behavioral task
behavioral1
Sample
SystemLogs (1).zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Browsers/Cookies/OPERA.txt
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Browsers/Passwords.txt
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Epic/GameUserSettings.ini
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Minecraft/Essential/microsoft_accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Minecraft/Feather/accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Minecraft/Lunar/accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Minecraft/Meteor/accounts.nbt
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Steam/DialogConfig.vdf
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Steam/DialogConfigOverlay_1080x1920.vdf
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Steam/DialogConfigOverlay_1920x1080.vdf
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Steam/avatarcache/76561199490338408.png
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Steam/config.vdf
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Steam/coplay_76561199490338408.vdf
Resource
win11-20241023-en
Behavioral task
behavioral15
Sample
Steam/libraryfolders.vdf
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Steam/loginusers.vdf
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Steam/remoteclients.vdf
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Steam/steamapps.vrmanifest
Resource
win11-20241007-en
General
-
Target
Browsers/Cookies/OPERA.txt
-
Size
3KB
-
MD5
467062ab9058f3ac45beb7fe6b4e74d0
-
SHA1
a75d0c5febd5bb49322868f3f0d7aef27d58ead5
-
SHA256
1c8fd0d4a710b936ccda450b99de628977c8578ded79f75916e583ed6c3ade4a
-
SHA512
9796f2731d6c92b3bf0f9e236cee59815344d00856fe05e789d29ad1483c8ca56e1d5e472b15344d8c311116f892066d1929670df20eeb332fce7adb424052ad
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5868 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2936 wrote to memory of 5868 2936 cmd.exe 78 PID 2936 wrote to memory of 5868 2936 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Browsers\Cookies\OPERA.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Browsers\Cookies\OPERA.txt2⤵
- Opens file in notepad (likely ransom note)
PID:5868
-