General
-
Target
OllamaSetup.exe
-
Size
227.4MB
-
Sample
240630-d4bxraxakm
-
MD5
c09d7e2a2cd27e395193f38d7b957aaa
-
SHA1
763e9ac6475d61f56cf38c16470086dab8fa340c
-
SHA256
d89045c9389d97c201abab4e4105166e9f5551bbaca2bb8b9f0401b9d2aebcf7
-
SHA512
affd57ccd0b35dd66498645ca0e36bbf8d3a764ad72f916e18ee7f3144c4069f5d6108cf07ed6cbb718e4a9f850cfb1cd0b3507528cf3786ee8d5aeeeea49d06
-
SSDEEP
6291456:47us/m6G7CuDPaLDys4LoYml3+rdkU+CVu41K:/27gQDysOPpjVNK
Static task
static1
Behavioral task
behavioral1
Sample
OllamaSetup.exe
Resource
win11-20240508-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
OllamaSetup.exe
-
Size
227.4MB
-
MD5
c09d7e2a2cd27e395193f38d7b957aaa
-
SHA1
763e9ac6475d61f56cf38c16470086dab8fa340c
-
SHA256
d89045c9389d97c201abab4e4105166e9f5551bbaca2bb8b9f0401b9d2aebcf7
-
SHA512
affd57ccd0b35dd66498645ca0e36bbf8d3a764ad72f916e18ee7f3144c4069f5d6108cf07ed6cbb718e4a9f850cfb1cd0b3507528cf3786ee8d5aeeeea49d06
-
SSDEEP
6291456:47us/m6G7CuDPaLDys4LoYml3+rdkU+CVu41K:/27gQDysOPpjVNK
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Windows Management Instrumentation
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1