General
-
Target
HEUR-Trojan-PSW.MSIL.Anagra.gen-e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8.exe
-
Size
9MB
-
Sample
220922-v91azafghl
-
MD5
e75dff9d996dfb5819c678125f3ab581
-
SHA1
4108c1c194bcc3643413b98073b67d2c57507435
-
SHA256
e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8
-
SHA512
209a8c617d3c6bcd6d82cefb9d6c7ae4114bb157d181c17bf407d74e0f10d8a44b1a8c10ac71b2532282d49be8c5218527b0b16514f80c3cf1ff76ca23fdb767
-
SSDEEP
98304:/eKh9jBA5gjbnI3OkLFxD5tKZDunjxynuzgqPoBhz1aRxcSUDk36SAEdhvxWa9PA:/XrjPqPe1Cxcxk3ZAEUadzR8yc4gvF
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan-PSW.MSIL.Anagra.gen-e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-PSW.MSIL.Anagra.gen-e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@Please_Read_Me@.txt
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\AppData\Local\Temp\@Please_Read_Me@.txt
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
HEUR-Trojan-PSW.MSIL.Anagra.gen-e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8.exe
-
Size
9MB
-
MD5
e75dff9d996dfb5819c678125f3ab581
-
SHA1
4108c1c194bcc3643413b98073b67d2c57507435
-
SHA256
e64a182607d00395ebd9658681b3bb8f8d5a3436587a2bb5f50355b65a647bd8
-
SHA512
209a8c617d3c6bcd6d82cefb9d6c7ae4114bb157d181c17bf407d74e0f10d8a44b1a8c10ac71b2532282d49be8c5218527b0b16514f80c3cf1ff76ca23fdb767
-
SSDEEP
98304:/eKh9jBA5gjbnI3OkLFxD5tKZDunjxynuzgqPoBhz1aRxcSUDk36SAEdhvxWa9PA:/XrjPqPe1Cxcxk3ZAEUadzR8yc4gvF
-
Modifies WinLogon for persistence
-
Modifies system executable filetype association
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Winlogon Helper DLL
1Change Default File Association
1Registry Run Keys / Startup Folder
1Bootkit
1Hidden Files and Directories
1