General
-
Target
yes.txt
-
Size
33B
-
Sample
240630-j9a6asvfnh
-
MD5
4a927bb93e0a2b7789fa4b8a396bc365
-
SHA1
9f78b8c2d634343e4a8672a4cfaabb7927b8ef0a
-
SHA256
3a611a0e37fa227c6dd009a4cf990f9e25dec8d61a11d45d518d73109a2d989e
-
SHA512
ea97efef3509d5c328b12fe35bdbeb06872540b61ebc3ced8d6ef2f48304107b2b1658e3635d8f12d89f86e017c2c6ec707be152e296c783d022a7c2d81ccbbd
Static task
static1
Behavioral task
behavioral1
Sample
yes.txt
Resource
win10-20240404-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
yes.txt
-
Size
33B
-
MD5
4a927bb93e0a2b7789fa4b8a396bc365
-
SHA1
9f78b8c2d634343e4a8672a4cfaabb7927b8ef0a
-
SHA256
3a611a0e37fa227c6dd009a4cf990f9e25dec8d61a11d45d518d73109a2d989e
-
SHA512
ea97efef3509d5c328b12fe35bdbeb06872540b61ebc3ced8d6ef2f48304107b2b1658e3635d8f12d89f86e017c2c6ec707be152e296c783d022a7c2d81ccbbd
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3