Analysis

  • max time kernel
    92s
  • max time network
    203s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/02/2025, 19:12

General

  • Target

    Cyberangreb/Repetatively/desorienteres.txt

  • Size

    491B

  • MD5

    663e26e192d34c89a21482f86a0cc079

  • SHA1

    d50c89ddf76d97b7fff7afbb20fe698b820f35be

  • SHA256

    79ab4370ca578d5fa793bfe1a3041d70b95855d3056594fa41edc00ecf416a20

  • SHA512

    b9a84b48f8a8f733f10a88f285169eca7416e6fe1a2b51b73a4a4228c7a8781292dcbde1ff748ecd1e7ff14b743f3e0bf455ee3c1bd0bf2454b0e33b39a30fa3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\desorienteres.txt
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Cyberangreb\Repetatively\desorienteres.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads