Overview
overview
10Static
static
3RANSOMWARE...er.zip
windows7-x64
1RANSOMWARE...er.zip
windows10-1703-x64
1RANSOMWARE...er.zip
windows10-2004-x64
1RANSOMWARE...er.zip
windows11-21h2-x64
RANSOMWARE...ICENSE
windows7-x64
1RANSOMWARE...ICENSE
windows10-1703-x64
1RANSOMWARE...ICENSE
windows10-2004-x64
1RANSOMWARE...ICENSE
windows11-21h2-x64
1RANSOMWARE...DME.md
windows7-x64
3RANSOMWARE...DME.md
windows10-1703-x64
3RANSOMWARE...DME.md
windows10-2004-x64
3RANSOMWARE...DME.md
windows11-21h2-x64
3RANSOMWARE...ry.zip
windows7-x64
1RANSOMWARE...ry.zip
windows10-1703-x64
1RANSOMWARE...ry.zip
windows10-2004-x64
1RANSOMWARE...ry.zip
windows11-21h2-x64
1ed01ebfbc9...aa.exe
windows7-x64
10ed01ebfbc9...aa.exe
windows10-1703-x64
10ed01ebfbc9...aa.exe
windows10-2004-x64
10ed01ebfbc9...aa.exe
windows11-21h2-x64
10Analysis
-
max time kernel
838s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-12-2023 16:05
Static task
static1
Behavioral task
behavioral1
Sample
RANSOMWARE-WANNACRY-2.0-master.zip
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
RANSOMWARE-WANNACRY-2.0-master.zip
Resource
win10-20231129-en
Behavioral task
behavioral3
Sample
RANSOMWARE-WANNACRY-2.0-master.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral4
Sample
RANSOMWARE-WANNACRY-2.0-master.zip
Resource
win11-20231129-en
Behavioral task
behavioral5
Sample
RANSOMWARE-WANNACRY-2.0-master/LICENSE
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
RANSOMWARE-WANNACRY-2.0-master/LICENSE
Resource
win10-20231129-en
Behavioral task
behavioral7
Sample
RANSOMWARE-WANNACRY-2.0-master/LICENSE
Resource
win10v2004-20231130-en
Behavioral task
behavioral8
Sample
RANSOMWARE-WANNACRY-2.0-master/LICENSE
Resource
win11-20231129-en
Behavioral task
behavioral9
Sample
RANSOMWARE-WANNACRY-2.0-master/README.md
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
RANSOMWARE-WANNACRY-2.0-master/README.md
Resource
win10-20231023-en
Behavioral task
behavioral11
Sample
RANSOMWARE-WANNACRY-2.0-master/README.md
Resource
win10v2004-20231127-en
Behavioral task
behavioral12
Sample
RANSOMWARE-WANNACRY-2.0-master/README.md
Resource
win11-20231128-en
Behavioral task
behavioral13
Sample
RANSOMWARE-WANNACRY-2.0-master/Ransomware.WannaCry.zip
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
RANSOMWARE-WANNACRY-2.0-master/Ransomware.WannaCry.zip
Resource
win10-20231025-en
Behavioral task
behavioral15
Sample
RANSOMWARE-WANNACRY-2.0-master/Ransomware.WannaCry.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral16
Sample
RANSOMWARE-WANNACRY-2.0-master/Ransomware.WannaCry.zip
Resource
win11-20231128-en
Behavioral task
behavioral17
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10-20231129-en
Behavioral task
behavioral19
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20231130-en
Behavioral task
behavioral20
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win11-20231129-en
General
-
Target
RANSOMWARE-WANNACRY-2.0-master/README.md
-
Size
70B
-
MD5
39148bc21924851d9082b687dc69e2dc
-
SHA1
5d1e5490476227aa8877b87aad184031e19dc33a
-
SHA256
76a94c98df32a1d37cc7f1e2b86bdc524eda3fedcdb35e57de0dd56bd976142f
-
SHA512
2415bb9de017c086abf8315e4288a04d5eb6048af2637e75843778f24de6834154b68365794b6cbc09ef5da0fe96d5bfce20227bf3656d23b7f148fb60988041
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.md rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1764 wrote to memory of 1740 1764 cmd.exe 29 PID 1764 wrote to memory of 1740 1764 cmd.exe 29 PID 1764 wrote to memory of 1740 1764 cmd.exe 29 PID 1740 wrote to memory of 2676 1740 rundll32.exe 30 PID 1740 wrote to memory of 2676 1740 rundll32.exe 30 PID 1740 wrote to memory of 2676 1740 rundll32.exe 30 PID 1740 wrote to memory of 2676 1740 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b81cf56da041e00285cc111a003bfb12
SHA123ce3f9c281e2168bc20ed32837acbccd96c8a04
SHA2568a807cd8656562c7ccd5a7390664313bf74e1483b4bd796dc7c7f8153e8c7940
SHA5121a9b054ca05beb9c9d0228eed9af0a9ce9175d454d0c2969a372f12903ace91fd486f0046717df5e5853e1980c760841b4d9c04d05a230a6419484a16d9fbd38