General
-
Target
Request for Quotation (RFQ_196).zip.zip
-
Size
3.3MB
-
Sample
230326-ytbjfshg96
-
MD5
d6fddf365b555b5e24a4abe7ba97e75b
-
SHA1
20c66ab6aed76664f41c9f213ae96a0fd04d4823
-
SHA256
7b11cc3ffb48210931452f60a0258abdc6431174ce3c2afe2ef7e35c7058c6c2
-
SHA512
2fd0fba011eb284f10febbc2562724ed73c049ffb8adc4ed465b88670e8c118bb89d6713a30c92c6984fa7466e96298b311b15a7bef66dcfe24328ff7e44f41b
-
SSDEEP
98304:XUhITbQ/gVvfg05KzdSb9N5YzMpocOUSTbzhAAY7cfYUPzB1r:XlOgVXgnSZN5XpjOU+Ol/0
Static task
static1
Behavioral task
behavioral1
Sample
Proforma Invoice and Bank swift-REG.PI-0086547654.exe
Resource
win10-20230220-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Proforma Invoice and Bank swift-REG.PI-0086547654.exe
-
Size
3.4MB
-
MD5
84c82835a5d21bbcf75a61706d8ab549
-
SHA1
5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
-
SHA256
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
-
SHA512
90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-