General
-
Target
2024-06-06_a47cba5449bed1ff259e3cef2ab285ea_destroyer_wannacry
-
Size
26KB
-
Sample
240606-bvj6nadf9y
-
MD5
a47cba5449bed1ff259e3cef2ab285ea
-
SHA1
454888a1a43032e333c22dc6fdf7bbad1b0b0970
-
SHA256
e2af60fadb05a57ec747bd56a918a5e5716410817d23df727909e36e95fa0aef
-
SHA512
e9df43d65e169f8325916ffd783446998c9163f88eeee5c838e6b7e5d8cf39e731c779b42f4769aedbef998ec252e52ea453d383161bbcaf7cd57928472d2a64
-
SSDEEP
384:4PzYzvnvixdrqvwCMkNCk0Aa9+UYu7vl/ps4+7UQHIf:ug6xdrL9+Un9WNzHIf
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-06_a47cba5449bed1ff259e3cef2ab285ea_destroyer_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-06_a47cba5449bed1ff259e3cef2ab285ea_destroyer_wannacry.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\Contacts\Readme-ID-KXIPPCKF.txt
Targets
-
-
Target
2024-06-06_a47cba5449bed1ff259e3cef2ab285ea_destroyer_wannacry
-
Size
26KB
-
MD5
a47cba5449bed1ff259e3cef2ab285ea
-
SHA1
454888a1a43032e333c22dc6fdf7bbad1b0b0970
-
SHA256
e2af60fadb05a57ec747bd56a918a5e5716410817d23df727909e36e95fa0aef
-
SHA512
e9df43d65e169f8325916ffd783446998c9163f88eeee5c838e6b7e5d8cf39e731c779b42f4769aedbef998ec252e52ea453d383161bbcaf7cd57928472d2a64
-
SSDEEP
384:4PzYzvnvixdrqvwCMkNCk0Aa9+UYu7vl/ps4+7UQHIf:ug6xdrL9+Un9WNzHIf
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware
-
Modifies boot configuration data using bcdedit
-
Renames multiple (222) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-