General
-
Target
image.png
-
Size
7KB
-
Sample
240702-qh9m4stena
-
MD5
8a5d9ed2e28fbd931a184e41c1bfc448
-
SHA1
656d42a076e16b272e98b0fdef7cfc97ab5ac007
-
SHA256
92d59f918083649917c9e4d5cc01ac75f7527dd55e5adbb4dcea3f72e5d11daa
-
SHA512
1bc48370209ddca6aa3ee4e2308a9a8d7e6943b0d206d8b18504c5e5c68e450668b6fc835f2594eec883c7413375209f38446856e4e9eb588ebd7ee8aaa50a97
-
SSDEEP
192:SzG/fIsAVahNR5rwQK+wetFt1Lzi5+CnxQ032zD:SzgEaffNc+1L4vxQ0YD
Static task
static1
Behavioral task
behavioral1
Sample
image.png
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
image.png
Resource
win10v2004-20240611-en
Malware Config
Extracted
njrat
0.7d
MyBot
127.0.0.1:1
6d0fd563d79d098fae97c5776db36a27
-
reg_key
6d0fd563d79d098fae97c5776db36a27
-
splitter
Y262SUCZ4UJJ
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
image.png
-
Size
7KB
-
MD5
8a5d9ed2e28fbd931a184e41c1bfc448
-
SHA1
656d42a076e16b272e98b0fdef7cfc97ab5ac007
-
SHA256
92d59f918083649917c9e4d5cc01ac75f7527dd55e5adbb4dcea3f72e5d11daa
-
SHA512
1bc48370209ddca6aa3ee4e2308a9a8d7e6943b0d206d8b18504c5e5c68e450668b6fc835f2594eec883c7413375209f38446856e4e9eb588ebd7ee8aaa50a97
-
SSDEEP
192:SzG/fIsAVahNR5rwQK+wetFt1Lzi5+CnxQ032zD:SzgEaffNc+1L4vxQ0YD
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
3Scripting
1