Resubmissions
04-07-2024 11:28
240704-nlal3sycra 1003-07-2024 20:16
240703-y2dnsaxflh 303-07-2024 20:08
240703-ywwmeawbnp 1003-07-2024 20:07
240703-ywad6sxdqg 303-07-2024 20:02
240703-ysff1swakk 603-07-2024 20:02
240703-yr5draxcng 303-07-2024 20:01
240703-yryk7sxcna 303-07-2024 19:57
240703-ypp62sxbne 303-07-2024 19:55
240703-ynf7ravgnn 3General
-
Target
AutoDox.exe
-
Size
81KB
-
Sample
240703-ywwmeawbnp
-
MD5
ec51cfbde4a4df4eceb8313adf8d93ca
-
SHA1
f8925a067c34ab1b0e7da2de961af20247ace3fa
-
SHA256
aef13f3ec8abf777929e42aa3de86774ab8362f7fbfcc0475c7b912ce253c002
-
SHA512
1cc6c73c33ce6d00c102f9ed3c6733c532f131b00761fd4ff59cda87c560e3ce3e06dfcbb8a886976ae5084c9d36c3f02d9afefca5b1403c20b53735fe24bada
-
SSDEEP
1536:9rsgf4VFHlI++UIoyjyCL6sf+Fle8Ifvl1loJbh76e:ClI++UIZIsf+Fle8Ift1loJbh76
Static task
static1
Behavioral task
behavioral1
Sample
AutoDox.exe
Resource
win11-20240508-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
AutoDox.exe
-
Size
81KB
-
MD5
ec51cfbde4a4df4eceb8313adf8d93ca
-
SHA1
f8925a067c34ab1b0e7da2de961af20247ace3fa
-
SHA256
aef13f3ec8abf777929e42aa3de86774ab8362f7fbfcc0475c7b912ce253c002
-
SHA512
1cc6c73c33ce6d00c102f9ed3c6733c532f131b00761fd4ff59cda87c560e3ce3e06dfcbb8a886976ae5084c9d36c3f02d9afefca5b1403c20b53735fe24bada
-
SSDEEP
1536:9rsgf4VFHlI++UIoyjyCL6sf+Fle8Ifvl1loJbh76e:ClI++UIZIsf+Fle8Ift1loJbh76
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1