General
-
Target
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.zip
-
Size
3.4MB
-
Sample
240621-bjwejsthnb
-
MD5
11d35d34cdeb7fc2772c6d02cc9754dd
-
SHA1
c06886933876c6afefe3dd360da48533e2a80ec6
-
SHA256
cb6602ec77e62c6f9f37a762870ee8917211d05f9138cf161047842e0eef8092
-
SHA512
ab1437393544f013de921187a66ea39040e42f5f77d4f061f6c7aed6322c3cc23e3912589d6ce34694a78b1996899098ed065dec9d93102041de4fc26baad363
-
SSDEEP
98304:sWHqBvStXWO3CYHTXXZIX0//hXCOrSjF+Z2iXQwTBO:7Hq4tXf3Ce6ENPrSjcBQyO
Static task
static1
Behavioral task
behavioral1
Sample
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.zip
Resource
win11-20240611-en
Behavioral task
behavioral3
Sample
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.exe
Resource
win11-20240508-en
Malware Config
Extracted
C:\ProgramData\ppcvxtmedh378\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\ProgramData\fsbtirdsrpaoryg939\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.zip
-
Size
3.4MB
-
MD5
11d35d34cdeb7fc2772c6d02cc9754dd
-
SHA1
c06886933876c6afefe3dd360da48533e2a80ec6
-
SHA256
cb6602ec77e62c6f9f37a762870ee8917211d05f9138cf161047842e0eef8092
-
SHA512
ab1437393544f013de921187a66ea39040e42f5f77d4f061f6c7aed6322c3cc23e3912589d6ce34694a78b1996899098ed065dec9d93102041de4fc26baad363
-
SSDEEP
98304:sWHqBvStXWO3CYHTXXZIX0//hXCOrSjF+Z2iXQwTBO:7Hq4tXf3Ce6ENPrSjcBQyO
Score1/10 -
-
-
Target
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf.bin
-
Size
3.6MB
-
MD5
d5dcd28612f4d6ffca0cfeaefd606bcf
-
SHA1
cf60fa60d2f461dddfdfcebf16368e6b539cd9ba
-
SHA256
32f24601153be0885f11d62e0a8a2f0280a2034fc981d8184180c5d3b1b9e8cf
-
SHA512
dbfcf464c3211b7454c406a9f9532c416910ac24ea862d7061e3503f294d690b4957020dcc703984449e0934c7a595cf9061412fa25383850dd86235648ac23b
-
SSDEEP
98304:whqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3R:whqPe1Cxcxk3ZAEUadzR8yc4gB
-
Contacts a large (15467) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1