Resubmissions
08/05/2023, 16:29
230508-ty883add2w 703/05/2023, 17:51
230503-wfl2xshf41 603/05/2023, 17:22
230503-vxj38ahe31 603/05/2023, 17:04
230503-vlkklshd5x 1003/05/2023, 17:00
230503-vhycashd4z 1003/05/2023, 16:53
230503-vebdcshd3v 1003/05/2023, 16:47
230503-vaqbqahd2v 703/05/2023, 13:35
230503-qvq2jaeh33 1002/05/2023, 18:35
230502-w8fqlscb24 1002/05/2023, 18:32
230502-w6ltvaca89 1General
-
Target
https://mega.nz/file/4gJVxDaT#eAIMRrtwqm4KihPTLFv2W4Cw1-7TcDnmpkKQsdVvPpA
-
Sample
230503-qvq2jaeh33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/4gJVxDaT#eAIMRrtwqm4KihPTLFv2W4Cw1-7TcDnmpkKQsdVvPpA
Resource
win10v2004-20230220-en
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
https://mega.nz/file/4gJVxDaT#eAIMRrtwqm4KihPTLFv2W4Cw1-7TcDnmpkKQsdVvPpA
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Drops Chrome extension
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-