General
-
Target
Ransomware.WannaCry.zip
-
Size
153KB
-
Sample
240619-zw76wawcnp
-
MD5
35c2028817410e9238c9ea4b1805b3f5
-
SHA1
884cd58dc55a78dfaac8531788fd428eb70b7465
-
SHA256
f075fdf9c339ca3f25129a723cd8ca1b1aa7ca9e05fea72389adba1e433c3214
-
SHA512
d6cb574785b1819cd4822f4a497a0b1354864cf346db27176c78ff12294b4056ce725943693cb66917268b53037439678c29fa0288423f62f5a0d375600719f4
-
SSDEEP
3072:BdLygHEMAqbiwxZwET83alfPfkgo92WaWscB0R7tZ9HWPF7ixWPtiAIz3sJA+UT3:zW4oBG2n9dH5M2vkm0aFRv3pId9RY9UH
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.WannaCry.zip
Resource
win10-20240404-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Ransomware.WannaCry.zip
-
Size
153KB
-
MD5
35c2028817410e9238c9ea4b1805b3f5
-
SHA1
884cd58dc55a78dfaac8531788fd428eb70b7465
-
SHA256
f075fdf9c339ca3f25129a723cd8ca1b1aa7ca9e05fea72389adba1e433c3214
-
SHA512
d6cb574785b1819cd4822f4a497a0b1354864cf346db27176c78ff12294b4056ce725943693cb66917268b53037439678c29fa0288423f62f5a0d375600719f4
-
SSDEEP
3072:BdLygHEMAqbiwxZwET83alfPfkgo92WaWscB0R7tZ9HWPF7ixWPtiAIz3sJA+UT3:zW4oBG2n9dH5M2vkm0aFRv3pId9RY9UH
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1