General
-
Target
updater.exe
-
Size
4.6MB
-
Sample
240219-sw2wjafb58
-
MD5
94e92de578694ea5e9975230e6986423
-
SHA1
78afcc8db7f7c5ff5ae13bc0716b060e6287bbb3
-
SHA256
93075f056d16b39f8697a5c25bb258b8a77b60711e8d2741cd537880364c603c
-
SHA512
468f9642e6ac83807a99a317489e20a89b7f9ffded2a4987e386174348f242c3a34a4d3d107efa484cc964bc6409db8648b92bc444a034081e54f9fe9ebaa53c
-
SSDEEP
98304:zmx92R40pFplp/g4JAQEz6RTbWs+pPuRPqjlEpWrmgt3BdtiK92:Sx92RXpFp8MAQSsfRwWWrTBOK9
Behavioral task
behavioral1
Sample
updater.exe
Resource
win11-20240214-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
updater.exe
-
Size
4.6MB
-
MD5
94e92de578694ea5e9975230e6986423
-
SHA1
78afcc8db7f7c5ff5ae13bc0716b060e6287bbb3
-
SHA256
93075f056d16b39f8697a5c25bb258b8a77b60711e8d2741cd537880364c603c
-
SHA512
468f9642e6ac83807a99a317489e20a89b7f9ffded2a4987e386174348f242c3a34a4d3d107efa484cc964bc6409db8648b92bc444a034081e54f9fe9ebaa53c
-
SSDEEP
98304:zmx92R40pFplp/g4JAQEz6RTbWs+pPuRPqjlEpWrmgt3BdtiK92:Sx92RXpFp8MAQSsfRwWWrTBOK9
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
1