General
-
Target
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214
-
Size
9.3MB
-
Sample
240417-n98h1seb55
-
MD5
da759cfc9fbf43c835d1b37bfe5a7052
-
SHA1
0a2fcafefeec0450472d5e1383decaa585a28749
-
SHA256
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214
-
SHA512
59c8bad45ea9a5f414b7f3aa20f5cd817012a10d5af52e877e6b41536479e21b29d6d1bd93b072f3d6d292ebef07a2ff3344857990f54e6d8d362c73d3025f00
-
SSDEEP
196608:ymL7qg/mytTi11XIwYKFygsbJovULuoUhbU9/uS9Z7q47cl99:ymvqO+XVygsFlFUhbUoS77q4w/9
Static task
static1
Behavioral task
behavioral1
Sample
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214.exe
Resource
win10-20240319-en
Behavioral task
behavioral4
Sample
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214.exe
Resource
win11-20240412-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214
-
Size
9.3MB
-
MD5
da759cfc9fbf43c835d1b37bfe5a7052
-
SHA1
0a2fcafefeec0450472d5e1383decaa585a28749
-
SHA256
e212cef8758a00010eae1fa355f476dec6ca896d8f22c64db431ac70a2952214
-
SHA512
59c8bad45ea9a5f414b7f3aa20f5cd817012a10d5af52e877e6b41536479e21b29d6d1bd93b072f3d6d292ebef07a2ff3344857990f54e6d8d362c73d3025f00
-
SSDEEP
196608:ymL7qg/mytTi11XIwYKFygsbJovULuoUhbU9/uS9Z7q47cl99:ymvqO+XVygsFlFUhbUoS77q4w/9
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1