General
-
Target
test.vbs.zip
-
Size
498B
-
Sample
200714-7at478ynk6
-
MD5
f0e200117a3390245012ae7e380eb285
-
SHA1
9c08cfad3e33b29d01c53a88e0628690abeccb06
-
SHA256
7846adeae0737e0ae55d0045adeb644c27745c2d0f1af92c56a9e4351e881451
-
SHA512
dba96be76d15f6bbbad0e34b9018a963d6c1287595d0f20aeb3bdc26b05ec1e6f82fe5dd830f9fb04ada22f687fdb521199b395f552572aab9197c78ce6c03dc
Static task
static1
Behavioral task
behavioral1
Sample
test.vbs
Resource
win7
Behavioral task
behavioral2
Sample
test.vbs
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
test.vbs
-
Size
589B
-
MD5
94d9611bf2c6e0caa430b1b0b808da1e
-
SHA1
723de46bdda58dd345b0c0bfd8bdbc33ea1931ec
-
SHA256
8cf91cb3c0524feabe3b9502aa36ec58003e9e0db849901948cd335caf0e4f66
-
SHA512
6baddf54c364c1c39bccd4f3e78f2b97f62297382c46642f6fc921fb2bc950e3ee44c6f94b5447c13faa028d9bc706ee9784582188e7a07fd3805de836b63e8e
-
Blacklisted process makes network request
-
Executes dropped EXE
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Modifies service
-
Sets desktop wallpaper using registry
-