Resubmissions
17-04-2024 14:22
240417-rpz8pabf79 1017-04-2024 14:22
240417-rpk4rsbf68 1017-04-2024 14:22
240417-rpjwpsbf66 1017-04-2024 14:22
240417-rphzeabf63 1017-04-2024 14:21
240417-rpd1fsdb31 1015-04-2024 13:52
240415-q6f1psfh72 1015-04-2024 13:52
240415-q6fpyaab6w 1015-04-2024 13:51
240415-q5976afh68 1015-04-2024 13:51
240415-q59lmafh65 10General
-
Target
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2
-
Size
3.4MB
-
Sample
240415-q6f1psfh72
-
MD5
aadd501e7f87ad9279eec57a5ea987ca
-
SHA1
a378ed3f7e758e1c8389fdd33a1774ff5e38daa8
-
SHA256
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2
-
SHA512
b22b532ae337b272a5ce1a64f3e81e03f5d1e37a19035b961675d9a0bef8af43e12fed0bfb4b510a35d894bd7803f708c02cf3606a8e1da954300902867229f9
-
SSDEEP
98304:DEPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3T:DEPe1Cxcxk3ZAEUadzR8yc4gD
Static task
static1
Behavioral task
behavioral1
Sample
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2.exe
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2.exe
Resource
win11-20240412-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2
-
Size
3.4MB
-
MD5
aadd501e7f87ad9279eec57a5ea987ca
-
SHA1
a378ed3f7e758e1c8389fdd33a1774ff5e38daa8
-
SHA256
6a3693afc047b0dae27b852ecfddd8c03d2c8f96b37a36ac62647417747e9cd2
-
SHA512
b22b532ae337b272a5ce1a64f3e81e03f5d1e37a19035b961675d9a0bef8af43e12fed0bfb4b510a35d894bd7803f708c02cf3606a8e1da954300902867229f9
-
SSDEEP
98304:DEPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3T:DEPe1Cxcxk3ZAEUadzR8yc4gD
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1