General
-
Target
2024-06-29_396f245e7a0f755a79371e472db7f96d_wannacry
-
Size
3.4MB
-
Sample
240629-zmlarawcjh
-
MD5
396f245e7a0f755a79371e472db7f96d
-
SHA1
47708f00c1b875b638097f9a0c1cce8d0682be2c
-
SHA256
1d4e99feed6280682a3d5d9ae4ecc475afa9fd37ed223cd2c5d58fd7eed41fb5
-
SHA512
4ae18b62a8cd3d6636337180d0d99f1f340d2f9379e6423657ff3d40f7de98317f94ce97ccb04306b41659981961250203ec4679a4b4153d2fb715dae0b66afc
-
SSDEEP
98304:iqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3h:iqPe1Cxcxk3ZAEUadzR8yc4gx
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_396f245e7a0f755a79371e472db7f96d_wannacry.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-29_396f245e7a0f755a79371e472db7f96d_wannacry.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
2024-06-29_396f245e7a0f755a79371e472db7f96d_wannacry
-
Size
3.4MB
-
MD5
396f245e7a0f755a79371e472db7f96d
-
SHA1
47708f00c1b875b638097f9a0c1cce8d0682be2c
-
SHA256
1d4e99feed6280682a3d5d9ae4ecc475afa9fd37ed223cd2c5d58fd7eed41fb5
-
SHA512
4ae18b62a8cd3d6636337180d0d99f1f340d2f9379e6423657ff3d40f7de98317f94ce97ccb04306b41659981961250203ec4679a4b4153d2fb715dae0b66afc
-
SSDEEP
98304:iqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3h:iqPe1Cxcxk3ZAEUadzR8yc4gx
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1