General

  • Target

    323aad30a4b101401638289ffba87160

  • Size

    5.0MB

  • Sample

    220720-aschcsacap

  • MD5

    323aad30a4b101401638289ffba87160

  • SHA1

    612baf135019bf655b1164e46397cb8edf96bcc8

  • SHA256

    0df9590b8886a95da2a5eaf1b6ba79a53850ff12e124c0bf4cf8b00454952dec

  • SHA512

    f77704d639c962342f1bd3a04694d9dd4912ebe2757942348541bf2da2201f186ac93aeb60b5dcf24f6ca7d6a9b411b1740739f411b254eb0d1eb330a32d1071

Malware Config

Targets

    • Target

      323aad30a4b101401638289ffba87160

    • Size

      5.0MB

    • MD5

      323aad30a4b101401638289ffba87160

    • SHA1

      612baf135019bf655b1164e46397cb8edf96bcc8

    • SHA256

      0df9590b8886a95da2a5eaf1b6ba79a53850ff12e124c0bf4cf8b00454952dec

    • SHA512

      f77704d639c962342f1bd3a04694d9dd4912ebe2757942348541bf2da2201f186ac93aeb60b5dcf24f6ca7d6a9b411b1740739f411b254eb0d1eb330a32d1071

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (3330) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1260) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Scanning

3
T1046

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks