General
-
Target
09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa.7z
-
Size
3.3MB
-
Sample
220404-phm9faeed2
-
MD5
6ff4c46cd13d55514bd3fecce6bdfd37
-
SHA1
a1cbc33335e8496bf43fc0639d7d3f6189783ed8
-
SHA256
dc52a479a7ab7e1de5f982e528f90e098fed541cbf24074aa4358c4b00428a4c
-
SHA512
c46ea11505183357f383e2f24d5d761b3cacdbf73d0fc4b32c07d92e417982e2f6c42a33d7ec479af71f91b39d01e60d57b140c1adde8a790bfdccf0b07ab2c4
Static task
static1
Behavioral task
behavioral1
Sample
09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa.bin
-
Size
3.4MB
-
MD5
509c41ec97bb81b0567b059aa2f50fe8
-
SHA1
87420a2791d18dad3f18be436045280a4cc16fc4
-
SHA256
09a46b3e1be080745a6d8d88d6b5bd351b1c7586ae0dc94d0c238ee36421cafa
-
SHA512
fa7e6863f5f00ea73a09a8ab71937cf29094695a250c7510983d81d51e4775be4d417748b349f0a71f8d675a4943615b61c5dfdd0ad51d7402a9746c10ce1289
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-