General
-
Target
gg.png
-
Size
6KB
-
Sample
231023-fxwppaec6t
-
MD5
98445e7c9731818accbceb1212511f03
-
SHA1
2926c88ca89cb54d0c549127e0a563d8485b6cfc
-
SHA256
2e7abe65b47cba299cce9d64b55d6323af961b6e7a1bb6f2635a1e18bb437ff9
-
SHA512
e4e62e41201f4b3b3d76f13cc24bb96b8d5e53c901ac8e6be65ddafc6e21dd7bd25aeff23dc17699389c512a464ba4ca68a70a31f4d5944a9188b2e0572d18b5
-
SSDEEP
96:Phi//zBUNa7qIbzcGQDMcIRyYy42GkX/XJKlVl11GXWrWmHN6AlYoQ4EXk+:Phi/L287qKJtckyYyV67GmrWmt6A/Eh
Static task
static1
Behavioral task
behavioral1
Sample
gg.jpg
Resource
win10-20231020-en
Malware Config
Extracted
C:\Users\Admin\Downloads\Ransomware.WannaCry\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
gg.png
-
Size
6KB
-
MD5
98445e7c9731818accbceb1212511f03
-
SHA1
2926c88ca89cb54d0c549127e0a563d8485b6cfc
-
SHA256
2e7abe65b47cba299cce9d64b55d6323af961b6e7a1bb6f2635a1e18bb437ff9
-
SHA512
e4e62e41201f4b3b3d76f13cc24bb96b8d5e53c901ac8e6be65ddafc6e21dd7bd25aeff23dc17699389c512a464ba4ca68a70a31f4d5944a9188b2e0572d18b5
-
SSDEEP
96:Phi//zBUNa7qIbzcGQDMcIRyYy42GkX/XJKlVl11GXWrWmHN6AlYoQ4EXk+:Phi/L287qKJtckyYyV67GmrWmt6A/Eh
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3