Resubmissions

12/02/2025, 11:40

250212-ns8gpazldx 10

12/02/2025, 03:44

250212-eaz8xsykfv 10

11/02/2025, 22:45

250211-2pks4stnfm 10

Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250211-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2025, 22:45

General

  • Target

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe

  • Size

    481KB

  • MD5

    75367b27129a302e5ef5930a2c9699c0

  • SHA1

    73c3e68f1c25a4071e8bd035486d2445bbcb2aa7

  • SHA256

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec

  • SHA512

    8d4195ff8174cbae829723452bd6f1f78c9b00a28a041d8e346d4c45dac1a0956467f68ce3083761d801d707a782b89d0832213ded2ddf432ba15ab2e0bcf78c

  • SSDEEP

    6144:anGGn1wd4WWkSFyzAAe8zCgJkihWjduuNacDK8TOIwn5PKNuxK9u1Ot6u:QGGJWWT8zxho7WiPw5P0uiC86u

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Play family
  • Renames multiple (7320) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 29 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe
    "C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3296967594-3563063956-581523229-1000\desktop.ini

    Filesize

    1KB

    MD5

    d23a2d98d34541bef4d82e3cac8253c6

    SHA1

    311c7813864defecc8d9e8a13f71b7f6249f40c7

    SHA256

    6c5c77e13149ed769dd0009609d938edf6fa278562de82705a042828a6c7a939

    SHA512

    699bc5b67e8cd0570db0b29926889406976568a1cf24b39e7b86d3b234b1d85452cad4912accb6c6dba1fc911dd160e3707df7983977fbf9508bb1bbd0650d3f

  • C:\$Recycle.Bin\S-1-5-21-3296967594-3563063956-581523229-1000\desktop.ini

    Filesize

    1KB

    MD5

    3f88e15cf189abbe2a50c7b804cf9720

    SHA1

    5324d25eaa39a64f98ffc53bed2465575e4bcc09

    SHA256

    0e0a6aa73f0733450f2237206af20efe7430ec5a2fac3ae45f700910c7c333df

    SHA512

    20e52e5b5038e5681d89394da21ffd5d303a4c3fe69e306e6bd5e0aa090c36119e72b9e28389366c485a4499a1c67edc683f6b8b1f47064573af0f7eaef92457

  • memory/3288-0-0x0000000000D70000-0x0000000000D9C000-memory.dmp

    Filesize

    176KB