General
-
Target
gdsafhsdfg.png
-
Size
118KB
-
Sample
240419-x52dksdc88
-
MD5
e1f81c4c7dd1f272e5d7f12e8f6135c1
-
SHA1
80e40c474b3c22377a0671de621ca4c179f69620
-
SHA256
d23a8db80073c2b0f91a94cd852ebe1b6620557dcda026d96be78f8ea762c359
-
SHA512
5e1ff1228163be1642c1a6adea050bdff9410fdd299a005059e5487127c0217341eec6847f67a3c3882d8ce2c842b007127a49845615aedfbbb028e32aeec240
-
SSDEEP
3072:IfHAfEnUXNQp3xjuFkPQl3i/ga9a6wqbi+5AVsStiDQCWnbMCXR:IfgfLIBuqO+RtwkH+VMQ3f
Static task
static1
Behavioral task
behavioral1
Sample
gdsafhsdfg.png
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\Users\Admin\Downloads\WannaCry-main\WannaCry-main\@Please_Read_Me@.txt
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
gdsafhsdfg.png
-
Size
118KB
-
MD5
e1f81c4c7dd1f272e5d7f12e8f6135c1
-
SHA1
80e40c474b3c22377a0671de621ca4c179f69620
-
SHA256
d23a8db80073c2b0f91a94cd852ebe1b6620557dcda026d96be78f8ea762c359
-
SHA512
5e1ff1228163be1642c1a6adea050bdff9410fdd299a005059e5487127c0217341eec6847f67a3c3882d8ce2c842b007127a49845615aedfbbb028e32aeec240
-
SSDEEP
3072:IfHAfEnUXNQp3xjuFkPQl3i/ga9a6wqbi+5AVsStiDQCWnbMCXR:IfgfLIBuqO+RtwkH+VMQ3f
Score10/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1