General

  • Target

    Supergevaarlijkk.zip

  • Size

    11.2MB

  • Sample

    191029-7v9yqqxm3n

  • MD5

    0eaa0873494c517f30b5ae369b957a48

  • SHA1

    525ccc75b99fa65f9d76e715d2e6e7856ed54d12

  • SHA256

    6cd246cd910e33eaee00e3d138bc49fcf85562b5f8c394d4b092372d25cc0eac

  • SHA512

    09c0f85692944989c8c045bc65ae0c4fb031207faea369bcbbacd9cc3d466503c03fe4a075f1ce0477cfb5da5a46706de13ce4cfc660385d08bb07690238e3f7

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@Please_Read_Me@.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@WanaDecryptor@.exe". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@Please_Read_Me@.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn Next, please find an application file named "@WanaDecryptor@.exe". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Targets

    • Target

      0b627b4eca9b9e8bd04a0d1a103876f6e0fa91049fd0b51bae9ae41acaacf15b.doc

    • Size

      265KB

    • MD5

      34c85b83169b5e70bbfc76c2d6de2be0

    • SHA1

      cf7d59f9e2774b8b2de9f578bad3b78947d0c3f8

    • SHA256

      0b627b4eca9b9e8bd04a0d1a103876f6e0fa91049fd0b51bae9ae41acaacf15b

    • SHA512

      0610b68ef9916c73ed782dc60045c914c52dff1dc1258b634dd009303a4837b403334f2e6c35f137e12ca473f30c747cd9e08df2acbc3d2a9a6790b1b469eb4e

    • Process spawned unexpected child process

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Wannacry file encrypt

    • flawedammy family

    • wannacry family

    • Deletes shadow copies

    • Creates new service

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Modifies file permissions

    • Drops startup file

    • Loads dropped DLL

    • Program crash

    • Adds Run entry to start application

    • Discovering connected drives

    • Drops Office document

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Windows cmd obfuscated command

    • Target

      0dded430c1958ae0ec60c2d50ab99f562269ad1ee09db17606661bd55cd29c66.doc

    • Size

      81KB

    • MD5

      fac7b441a730abf96b210a8db9dbf3d1

    • SHA1

      9f5bb869b95136f51b954e4284f99168ff0e91fb

    • SHA256

      0dded430c1958ae0ec60c2d50ab99f562269ad1ee09db17606661bd55cd29c66

    • SHA512

      0a5ec69ec554639ede43c359f38f8d2e52718b7e29a06aa112ff8cdc99b2777a39c3a9455d3796033a813cceda7487104fb8f0027eccfa138bcd0c2064606f07

    Score
    N/A
    • Target

      91B5DB3C0CCBD68BD04C24571E27F99D.msi

    • Size

      277KB

    • MD5

      91b5db3c0ccbd68bd04c24571e27f99d

    • SHA1

      b01cb4fe38315d41fcbe9c6278ebe4574496ab0d

    • SHA256

      ec85138598c57c6a6bdb5ed470614f582d3b5a8c6b243eb2f41b9970ea13d130

    • SHA512

      9f0b07f961625fcc06ee64fcfe5e35e0d40db81f75c3cbc584434c1925fac241db69cac3c1a1bf329d965a4df9bdaa53c13bb8ea3206e2c9d4facf7f74ba21b7

    Score
    N/A
    • Target

      ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe

    • Size

      3.4MB

    • MD5

      84c82835a5d21bbcf75a61706d8ab549

    • SHA1

      5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

    • SHA256

      ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

    • SHA512

      90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

    Score
    N/A
    • Target

      fe9d72dd4b046bafdd144902ab570297629f83d06afb5a9ba7703382a29d588f.exe

    • Size

      3.6MB

    • MD5

      743a6891999db5d7179091aba5f98fdb

    • SHA1

      eeca4b8f88fcae9db6f54304270699d459fb5722

    • SHA256

      fe9d72dd4b046bafdd144902ab570297629f83d06afb5a9ba7703382a29d588f

    • SHA512

      9edef033663c828536190332ec87ac0096ffddae934d17c51b255a55ecb05774211a0edb1915c19384641befa291cfdfd2e3f878bf3b827f8b203ec1bee9dd96

    Score
    N/A

MITRE ATT&CK Matrix ATT&CK v6

Execution

PowerShell

1
T1086

Persistence

New Service

1
T1050

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Privilege Escalation

New Service

1
T1050

Defense Evasion

File Deletion

1
T1107

File Permissions Modification

1
T1222

Modify Registry

7
T1112

Install Root Certificate

1
T1130

Hidden Files and Directories

1
T1158

Disabling Security Tools

1
T1089

Discovery

Query Registry

7
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

6
T1082

Impact

Inhibit System Recovery

1
T1490

Defacement

1
T1491

Tasks