General

  • Target

    8810123ec8fabd8acb91a396572db3229971f85e788ef958022217f8a858ad38

  • Size

    5.0MB

  • Sample

    210515-vqjx23b39e

  • MD5

    8d7129d1ad154ae0f261b44b37b6ca01

  • SHA1

    6e6a12140fb66cd4dc21fe2fbcef6bb916796d97

  • SHA256

    8810123ec8fabd8acb91a396572db3229971f85e788ef958022217f8a858ad38

  • SHA512

    c7fe58ea40f9934762665c3221ce186964c4be877d05ade49ca9c7a8380c09487de859f71976f8b826f9f68a635bec1a9e8dc8f8069fc980d0df091e4f2d9145

Malware Config

Targets

    • Target

      8810123ec8fabd8acb91a396572db3229971f85e788ef958022217f8a858ad38

    • Size

      5.0MB

    • MD5

      8d7129d1ad154ae0f261b44b37b6ca01

    • SHA1

      6e6a12140fb66cd4dc21fe2fbcef6bb916796d97

    • SHA256

      8810123ec8fabd8acb91a396572db3229971f85e788ef958022217f8a858ad38

    • SHA512

      c7fe58ea40f9934762665c3221ce186964c4be877d05ade49ca9c7a8380c09487de859f71976f8b826f9f68a635bec1a9e8dc8f8069fc980d0df091e4f2d9145

    • Modifies firewall policy service

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Tasks