General
-
Target
DEADLY.exe
-
Size
24MB
-
Sample
230126-xrtrkseh73
-
MD5
6d4bb02205c4206a53e2567d9feeb567
-
SHA1
5abd02eac7b35332067bc67d66dc70484d565703
-
SHA256
7224da6282de5d67b0e6ee4a29a746ddcfd6fa9dea36ee4b2fad4b39a48d68a1
-
SHA512
ec4b624ad738ef3421899a4a0a0d5a2b15743c45f6b87abdca77ce8f67a9ce4e6934a888d43dbf441b7ad23a3865a3a8b68a67d332c1d0e61b637b40cf78ac20
-
SSDEEP
393216:ebDuO/sPrggW5mlXb5K842cuwGyjzT8I3A666Sq6nrS44OUEhe:eGGvy4n2cuW/3VS8DOnc
Static task
static1
Behavioral task
behavioral1
Sample
DEADLY.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Windows\@Please_Read_Me@.txt
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
DEADLY.exe
-
Size
24MB
-
MD5
6d4bb02205c4206a53e2567d9feeb567
-
SHA1
5abd02eac7b35332067bc67d66dc70484d565703
-
SHA256
7224da6282de5d67b0e6ee4a29a746ddcfd6fa9dea36ee4b2fad4b39a48d68a1
-
SHA512
ec4b624ad738ef3421899a4a0a0d5a2b15743c45f6b87abdca77ce8f67a9ce4e6934a888d43dbf441b7ad23a3865a3a8b68a67d332c1d0e61b637b40cf78ac20
-
SSDEEP
393216:ebDuO/sPrggW5mlXb5K842cuwGyjzT8I3A666Sq6nrS44OUEhe:eGGvy4n2cuW/3VS8DOnc
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation