General
-
Target
2024-04-05_f7ffa30812b4877520c674e446a82363_wannacry
-
Size
3.4MB
-
Sample
240405-zq23nsdb6v
-
MD5
f7ffa30812b4877520c674e446a82363
-
SHA1
d238fdd28eeb2975627b3bf0f7dd2f308724ecf8
-
SHA256
486ed9d8ffcbcf401acb0e98da2d989fb6960567d0f1f7cbde99e8d1393bca1d
-
SHA512
6c10d9fbe171e315868502afe6e6b022ca516864b66e3e730ccf0d292c6f4fe3903cbc0b31db7e5288194f35ca56dbbc82d46c122c9eb56639035688f2e34cdb
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3p:QqPu1Cxcxk3ZAEUadzR8yc4gZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-05_f7ffa30812b4877520c674e446a82363_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-05_f7ffa30812b4877520c674e446a82363_wannacry.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
2024-04-05_f7ffa30812b4877520c674e446a82363_wannacry
-
Size
3.4MB
-
MD5
f7ffa30812b4877520c674e446a82363
-
SHA1
d238fdd28eeb2975627b3bf0f7dd2f308724ecf8
-
SHA256
486ed9d8ffcbcf401acb0e98da2d989fb6960567d0f1f7cbde99e8d1393bca1d
-
SHA512
6c10d9fbe171e315868502afe6e6b022ca516864b66e3e730ccf0d292c6f4fe3903cbc0b31db7e5288194f35ca56dbbc82d46c122c9eb56639035688f2e34cdb
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3p:QqPu1Cxcxk3ZAEUadzR8yc4gZ
-
Detects command variations typically used by ransomware
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1