General

  • Target

    codigo para virus.txt

  • Size

    1KB

  • Sample

    230215-3lb78seg33

  • MD5

    898739061f8148b25706d565a964550f

  • SHA1

    af4757ffceeaf6871e3eb56fed648b44a0208a03

  • SHA256

    55df77785805a115b3626f3f8ef2b36a49ae09b9954462e7fbbf081b154eae6d

  • SHA512

    d21db9503a0abb57c822b2e605dcc6b875eacfe634f4d9084f0f39ce230e1d9e978cba4e41249ee283ddfae3a5d7df355e69bc04bd4f2aca34ce2b3f1a858c21

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\@Please_Read_Me@.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@WanaDecryptor@.exe". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      codigo para virus.txt

    • Size

      1KB

    • MD5

      898739061f8148b25706d565a964550f

    • SHA1

      af4757ffceeaf6871e3eb56fed648b44a0208a03

    • SHA256

      55df77785805a115b3626f3f8ef2b36a49ae09b9954462e7fbbf081b154eae6d

    • SHA512

      d21db9503a0abb57c822b2e605dcc6b875eacfe634f4d9084f0f39ce230e1d9e978cba4e41249ee283ddfae3a5d7df355e69bc04bd4f2aca34ce2b3f1a858c21

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

3
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

1
T1107

Modify Registry

5
T1112

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

6
T1012

System Information Discovery

6
T1082

Peripheral Device Discovery

2
T1120

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

1
T1490

Defacement

1
T1491

Tasks