Resubmissions

General

  • Target

    HelpMe.miobject

  • Size

    15KB

  • Sample

    240329-ypnyzshb82

  • MD5

    89be17d8e6296b2fda026040939ae36f

  • SHA1

    bc1b258aa095def48ffde9ce7590dc3d62759e03

  • SHA256

    0c959b40d661215b2d4cc720c2aaa5485adc9698ab2b7accf275c674fb8c32aa

  • SHA512

    0f55e7f8f7b324b9ee152f3901063c3db3266cbd68f218db38114bc06969e2dbe5d07e93d3cc4e975f859406a9820ab7b53a8f68faf4decf2dfcbcfc1a832d75

  • SSDEEP

    384:5VJyIdBgew5k2cowqNM+aRgmbKC9NBBV4ocS:5jvdBjwhi92IPsY

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      HelpMe.miobject

    • Size

      15KB

    • MD5

      89be17d8e6296b2fda026040939ae36f

    • SHA1

      bc1b258aa095def48ffde9ce7590dc3d62759e03

    • SHA256

      0c959b40d661215b2d4cc720c2aaa5485adc9698ab2b7accf275c674fb8c32aa

    • SHA512

      0f55e7f8f7b324b9ee152f3901063c3db3266cbd68f218db38114bc06969e2dbe5d07e93d3cc4e975f859406a9820ab7b53a8f68faf4decf2dfcbcfc1a832d75

    • SSDEEP

      384:5VJyIdBgew5k2cowqNM+aRgmbKC9NBBV4ocS:5jvdBjwhi92IPsY

    • Chaos

      Ransomware family first seen in June 2021.

    • Chaos Ransomware

    • Detect ZGRat V1

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Contacts a large (590) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks