Resubmissions

12/02/2025, 11:40

250212-ns8gpazldx 10

12/02/2025, 03:44

250212-eaz8xsykfv 10

11/02/2025, 22:45

250211-2pks4stnfm 10

Analysis

  • max time kernel
    122s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2025, 03:44

General

  • Target

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe

  • Size

    481KB

  • MD5

    75367b27129a302e5ef5930a2c9699c0

  • SHA1

    73c3e68f1c25a4071e8bd035486d2445bbcb2aa7

  • SHA256

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec

  • SHA512

    8d4195ff8174cbae829723452bd6f1f78c9b00a28a041d8e346d4c45dac1a0956467f68ce3083761d801d707a782b89d0832213ded2ddf432ba15ab2e0bcf78c

  • SSDEEP

    6144:anGGn1wd4WWkSFyzAAe8zCgJkihWjduuNacDK8TOIwn5PKNuxK9u1Ot6u:QGGJWWT8zxho7WiPw5P0uiC86u

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Play family
  • Renames multiple (7336) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Downloads MZ/PE file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 29 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe
    "C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2304
  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MEZBMDY2RjgtMUE5NC00MjY4LTlEOTItRDAxRUY5RDA0MEJDfSIgdXNlcmlkPSJ7Rjk1NjVCNzgtM0I3Qy00NjU1LTg0MEItQjFEMzZDNEVGQjUwfSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NUVGQjY1NTEtRTYyNi00MURBLTgyNEEtOTcyRDIxREVFQzkyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTA5NDcyMTEzIi8-PC9hcHA-PC9yZXF1ZXN0Pg
    1⤵
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    PID:19800
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\ReadMe.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:47052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-189444705-1272902858-1305688695-1000\desktop.ini

    Filesize

    1KB

    MD5

    8662f08042d9f8b687c42152e72fc434

    SHA1

    cf0de44a2cb7b2e012702bb808ff0a41e4be0373

    SHA256

    7138caafc6e46b1b146d14157e49f2909e6b645f07e2110f3b06a23fa15cf20a

    SHA512

    de716f801c0aab6c5a36fe15487df778ac847048c8f93bee254cab91a0a4c81edc139c9bedda1e050fef57df248037be90152924bfa81280da140d0195dac265

  • C:\$Recycle.Bin\S-1-5-21-189444705-1272902858-1305688695-1000\desktop.ini

    Filesize

    1KB

    MD5

    a9ea10ced423bbce538a23fca9a63336

    SHA1

    ec5c076eb2715cc5c0d15eeb7d0f79d31c5af424

    SHA256

    42820ef9d1c113d09ffea3d642b77ecc358e3d9738b4cef66536f3338ae8ea86

    SHA512

    ced10165fee3d0d5360ae7be9afa5f91ae84138c62adf6389b4008f0dbf3218e818513f735428d60d7ade07ef4c51fc70efa0cb9aa99701b591ce9380fc2e5bd

  • C:\ReadMe.txt

    Filesize

    403B

    MD5

    41733cf71ed774d8bd7e6c2d984c2167

    SHA1

    6ae836bd9ceee1ca5f7c46dd0b06a101810f3079

    SHA256

    65b7dda7d555423d5fdd18804cba04ad67b69a4ed16a04c0993fd98ef90f392c

    SHA512

    8fb8a9bc8f2f8fe1e4ba787ff34f1b6758f64758b1574f8e5a28e33cf526f24fd59df92beb2d98038a0498382f07a50c6fa04b0c1d395e81efa20e5b8f0a182b

  • memory/2304-0-0x0000000000650000-0x000000000067C000-memory.dmp

    Filesize

    176KB