Overview
overview
10Static
static
1SystemLogs (1).zip
windows11-21h2-x64
4Browsers/C...RA.txt
windows11-21h2-x64
3Browsers/P...ds.txt
windows11-21h2-x64
3Epic/GameU...gs.ini
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...s.json
windows11-21h2-x64
3Minecraft/...ts.nbt
windows11-21h2-x64
3Steam/Dial...ig.vdf
windows11-21h2-x64
3Steam/Dial...20.vdf
windows11-21h2-x64
3Steam/Dial...80.vdf
windows11-21h2-x64
3Steam/avat...08.png
windows11-21h2-x64
Steam/config.vdf
windows11-21h2-x64
3Steam/copl...08.vdf
windows11-21h2-x64
10Steam/libr...rs.vdf
windows11-21h2-x64
3Steam/loginusers.vdf
windows11-21h2-x64
3Steam/remo...ts.vdf
windows11-21h2-x64
3Steam/stea...nifest
windows11-21h2-x64
3Analysis
-
max time kernel
433s -
max time network
456s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2025 22:27
Static task
static1
Behavioral task
behavioral1
Sample
SystemLogs (1).zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Browsers/Cookies/OPERA.txt
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Browsers/Passwords.txt
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Epic/GameUserSettings.ini
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Minecraft/Essential/microsoft_accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Minecraft/Feather/accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Minecraft/Lunar/accounts.json
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Minecraft/Meteor/accounts.nbt
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Steam/DialogConfig.vdf
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Steam/DialogConfigOverlay_1080x1920.vdf
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Steam/DialogConfigOverlay_1920x1080.vdf
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Steam/avatarcache/76561199490338408.png
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Steam/config.vdf
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Steam/coplay_76561199490338408.vdf
Resource
win11-20241023-en
Behavioral task
behavioral15
Sample
Steam/libraryfolders.vdf
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Steam/loginusers.vdf
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Steam/remoteclients.vdf
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Steam/steamapps.vrmanifest
Resource
win11-20241007-en
General
-
Target
Browsers/Passwords.txt
-
Size
4KB
-
MD5
cbee70c7b5aadc4fe7802175df1fc803
-
SHA1
b6f22141e95b8838646655294db3b2449d7c4a35
-
SHA256
5035a12407d280228c6c2a8b915bec154d3718e6d6f51d5698993a9e5a62caac
-
SHA512
ad731fb4d51b94a6a4535659a91d2921b6aeb30874bae30ba0a83c33b38fba54d150795fa939be13b6ec7140d4c7d5182c81ed4230982949cf771f9a2261bbe6
-
SSDEEP
96:ekMz2HbUaS92y9DQR62SqOkSTctUYPF2FsFBl2:efzCbUaS92y9DQR67qOkSItUYPcFsFBU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4018527317-446799424-2810249686-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 460 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5348 wrote to memory of 460 5348 cmd.exe 78 PID 5348 wrote to memory of 460 5348 cmd.exe 78
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Browsers\Passwords.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Browsers\Passwords.txt2⤵
- Opens file in notepad (likely ransom note)
PID:460
-