Resubmissions

01/04/2025, 16:14

250401-tp2gvs11bw 10

01/04/2025, 14:12

250401-rhwxpazvdt 10

Analysis

  • max time kernel
    67s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 16:14

General

  • Target

    38775537030769180f53c8a9070de02086dcf762eea17d3f086d761a0c3f858a.exe

  • Size

    481KB

  • MD5

    3039e3c5a73f506446882271569da699

  • SHA1

    fe6c2d80fe6e20e23ffd5c36116b31b0c33ab926

  • SHA256

    cdb54fee4c049cfd0bd09206414e1c8bd5ec5cbab7e7fff30b2c8ae90796439e

  • SHA512

    7e95e5eefe9a3cf538eaa5adc4f454366d887ffcdb20ed5145731a77f0a12ccd07be67e7a90205230065c793d917c0c96e0abc68f22db2fc31467c53ede1a0a8

  • SSDEEP

    6144:cn2GnFwd6CWwR802pdHMzqIxkFBtL12sFekDKUTP7ondtxvyaeZSNGilD6uH:O2G3CWlMz2BFnWqTodrvPeCRF6uH

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Play family
  • Renames multiple (3669) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38775537030769180f53c8a9070de02086dcf762eea17d3f086d761a0c3f858a.exe
    "C:\Users\Admin\AppData\Local\Temp\38775537030769180f53c8a9070de02086dcf762eea17d3f086d761a0c3f858a.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3220
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\ReadMe.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:53388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3920955164-3782810283-1225622749-1000\desktop.ini

    Filesize

    1KB

    MD5

    ea10266fdc2a57da0b59b0a7796f29d6

    SHA1

    d7778f8dc7241dd1d38df6837a19fa4313c06e8f

    SHA256

    9317d2b338ff0f5b8f5cbd6f2132689c261f99630fdaf7113d936a211f91d88b

    SHA512

    5c446f354057d8606c38c18f04646560536f3fdd00e622ee9fb51ee70e9959c6c83ef610510344aa17fac0bfc3f437d3b1992cdb12e70afd45bf948b41b605aa

  • C:\ReadMe.txt

    Filesize

    406B

    MD5

    4eae841c940cfb5a1abeb3d82fcea027

    SHA1

    8e0ec2a84e287e8037ed78807c8eac348839bdd3

    SHA256

    28cfa631da7ca873558ce3b5d05dbd54d27d1bc06d6ad0b3cd392ab3f3f7eac3

    SHA512

    c50015f02405b7cd5dc37496d7c71b40a5cb61a7418ea96e13d9d32a2b7a8d56d1095e8f128e73dbe8ffe7358451cb01cfc9e261539db24b9635a37120bb8e59

  • memory/3220-0-0x0000000002860000-0x000000000288C000-memory.dmp

    Filesize

    176KB