General
-
Target
Ransomware
-
Size
328KB
-
Sample
240712-nvgrrasanr
-
MD5
6d788eaf3cc1031554c469c98e257afd
-
SHA1
2aa8933c6bbb645a6172aeeda75192d53ff9a7b6
-
SHA256
7578c912b272866d3711da823b1292abe68dd63c8f4223f6116acf03f0062dd6
-
SHA512
e035cfba64abef6646b922b7370381431b64fa91f89a4dc97c2400284f64e9bac2fccc5eb2c32d999e013b383005f20fce7de33b351f5274e382eca72a7c45ad
-
SSDEEP
6144:s+oj52n9dH5M2vkm0aOCl3pId9RV9OvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vm:doj52n9dH5M2vkm0aOCl3pId9RV9OvZx
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Ransomware
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Documents\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
Ransomware
-
Size
328KB
-
MD5
6d788eaf3cc1031554c469c98e257afd
-
SHA1
2aa8933c6bbb645a6172aeeda75192d53ff9a7b6
-
SHA256
7578c912b272866d3711da823b1292abe68dd63c8f4223f6116acf03f0062dd6
-
SHA512
e035cfba64abef6646b922b7370381431b64fa91f89a4dc97c2400284f64e9bac2fccc5eb2c32d999e013b383005f20fce7de33b351f5274e382eca72a7c45ad
-
SSDEEP
6144:s+oj52n9dH5M2vkm0aOCl3pId9RV9OvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vm:doj52n9dH5M2vkm0aOCl3pId9RV9OvZx
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies RDP port number used by Windows
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1