General

  • Target

    b16646ff78586a4be0c309470413db9f9317a1f1548c8482af802d9273e69ef5

  • Size

    5.0MB

  • Sample

    210515-3632ytqv8s

  • MD5

    17464a712d66c4dc954e392394f920dd

  • SHA1

    45fd965dc3e2a325c1f132f1f30e38ce1d89d44e

  • SHA256

    b16646ff78586a4be0c309470413db9f9317a1f1548c8482af802d9273e69ef5

  • SHA512

    fc97ea8fc0f99c1f15673f2e3d01f39db44f3c5cf35e82b4baca1b503a2684688830d30cc73345b816ddc10ce870c2f69471765630a37ccb843afd352eb3f7d2

Malware Config

Targets

    • Target

      b16646ff78586a4be0c309470413db9f9317a1f1548c8482af802d9273e69ef5

    • Size

      5.0MB

    • MD5

      17464a712d66c4dc954e392394f920dd

    • SHA1

      45fd965dc3e2a325c1f132f1f30e38ce1d89d44e

    • SHA256

      b16646ff78586a4be0c309470413db9f9317a1f1548c8482af802d9273e69ef5

    • SHA512

      fc97ea8fc0f99c1f15673f2e3d01f39db44f3c5cf35e82b4baca1b503a2684688830d30cc73345b816ddc10ce870c2f69471765630a37ccb843afd352eb3f7d2

    • Modifies firewall policy service

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Tasks