General

  • Target

    WannaCry2.ex

  • Size

    5.0MB

  • Sample

    240328-syfq3saf32

  • MD5

    0805cb0e64e34711530c95e58e38c11f

  • SHA1

    69a8ba560ef1aad2b1bc7614c1de8ed22e19deb6

  • SHA256

    773186144282a63cc3502ad10a3d8fd781a6c83eaabf06de4369b4ef96d93178

  • SHA512

    92b54b1fdf484fe188659b40e14e40ce69a736ae7feb02cb8f165843a18a5d358bf76f7e383d6166961c90916563f308757b6e6ab47ac1c9da8007e33fa1ed1a

  • SSDEEP

    98304:1DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:1DqPe1Cxcxk3ZAEUadzR8yc4H

Malware Config

Targets

    • Target

      WannaCry2.ex

    • Size

      5.0MB

    • MD5

      0805cb0e64e34711530c95e58e38c11f

    • SHA1

      69a8ba560ef1aad2b1bc7614c1de8ed22e19deb6

    • SHA256

      773186144282a63cc3502ad10a3d8fd781a6c83eaabf06de4369b4ef96d93178

    • SHA512

      92b54b1fdf484fe188659b40e14e40ce69a736ae7feb02cb8f165843a18a5d358bf76f7e383d6166961c90916563f308757b6e6ab47ac1c9da8007e33fa1ed1a

    • SSDEEP

      98304:1DqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:1DqPe1Cxcxk3ZAEUadzR8yc4H

    • Modifies firewall policy service

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (2035) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

1
T1112

Discovery

Network Service Discovery

1
T1046

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks