General

  • Target

    new.exe

  • Size

    9.8MB

  • Sample

    220403-z9npdsdfb3

  • MD5

    d4f472e8286d35080ee0fe3c7fd07355

  • SHA1

    bbafeb22e6b6639fc2f02dd000754813abcb5621

  • SHA256

    a1ef82ead049fd897874fa5e7e4fa23db225702186bf6ab87e537d67708753ad

  • SHA512

    646c8c6c617a62f3bbcca547894afc098ec1347cdb0376aaff1bd19ecbfe5a45c1f101bddade2098eb848e561ce8e34c90c7a433f696be877de9991cfcc9ce3d

Malware Config

Targets

    • Target

      new.exe

    • Size

      9.8MB

    • MD5

      d4f472e8286d35080ee0fe3c7fd07355

    • SHA1

      bbafeb22e6b6639fc2f02dd000754813abcb5621

    • SHA256

      a1ef82ead049fd897874fa5e7e4fa23db225702186bf6ab87e537d67708753ad

    • SHA512

      646c8c6c617a62f3bbcca547894afc098ec1347cdb0376aaff1bd19ecbfe5a45c1f101bddade2098eb848e561ce8e34c90c7a433f696be877de9991cfcc9ce3d

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Modifies file permissions

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Modify Existing Service

1
T1031

Defense Evasion

Hidden Files and Directories

2
T1158

Impair Defenses

1
T1562

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks