Resubmissions

12/02/2025, 11:40

250212-ns8gpazldx 10

12/02/2025, 03:44

250212-eaz8xsykfv 10

11/02/2025, 22:45

250211-2pks4stnfm 10

Analysis

  • max time kernel
    48s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2025, 11:40

General

  • Target

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe

  • Size

    481KB

  • MD5

    75367b27129a302e5ef5930a2c9699c0

  • SHA1

    73c3e68f1c25a4071e8bd035486d2445bbcb2aa7

  • SHA256

    a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec

  • SHA512

    8d4195ff8174cbae829723452bd6f1f78c9b00a28a041d8e346d4c45dac1a0956467f68ce3083761d801d707a782b89d0832213ded2ddf432ba15ab2e0bcf78c

  • SSDEEP

    6144:anGGn1wd4WWkSFyzAAe8zCgJkihWjduuNacDK8TOIwn5PKNuxK9u1Ot6u:QGGJWWT8zxho7WiPw5P0uiC86u

Score
10/10

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Play family
  • Renames multiple (2510) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 8 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe
    "C:\Users\Admin\AppData\Local\Temp\a782b9d82f21fb3aac32de6d24a8730eb39f1bd34bc590ca03fa6bb527c74fec.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:2176
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2092
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\ReadMe.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:3224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini

      Filesize

      1KB

      MD5

      64fea2e73b49c3932141a69deb5e92de

      SHA1

      747faf94f0f95473318c43c69e0bc3daff97c5f7

      SHA256

      4013ee5ed0f0bb3e775613eaf9f1c3cc27be4654f510f960154da34c7232aba2

      SHA512

      ff5b8bf44916db8ba46e2af33ef59b44a9ac46084b72c0a84474960fb648a1e742ee90bcd6224800b19286a1569b581d70834085f866cd25af9490dea43d9335

    • C:\ReadMe.txt

      Filesize

      403B

      MD5

      41733cf71ed774d8bd7e6c2d984c2167

      SHA1

      6ae836bd9ceee1ca5f7c46dd0b06a101810f3079

      SHA256

      65b7dda7d555423d5fdd18804cba04ad67b69a4ed16a04c0993fd98ef90f392c

      SHA512

      8fb8a9bc8f2f8fe1e4ba787ff34f1b6758f64758b1574f8e5a28e33cf526f24fd59df92beb2d98038a0498382f07a50c6fa04b0c1d395e81efa20e5b8f0a182b

    • memory/2176-0-0x0000000000240000-0x000000000026C000-memory.dmp

      Filesize

      176KB