General
-
Target
WannaCry_ransomware_attack
-
Size
429KB
-
Sample
240718-vvv3ps1gqa
-
MD5
c01af42ed6d1d1fb865f266124533dba
-
SHA1
90860f160ade023ffc6171f7cebaa399b7760995
-
SHA256
e46d669202569d23a377958fbbbd6efae4d90a2251033095669a5fea4d481688
-
SHA512
cbb679ce9957d0a3895fa0ea6377fba71da9de4581a188b393dbd3ae89efe2746182b12a5f2240a9abaa83ddf860e7cce111c0328933aa7811ccefb759ef3ee6
-
SSDEEP
3072:P7+1l16LFIaZUynffVCMAul/cb9nnjtJd17X63cPYWk31KYsA30Y8uyvt2a9DJkQ:CCbWqcv2plKx7BPavWXDfEIfP
Static task
static1
Behavioral task
behavioral1
Sample
WannaCry_ransomware_attack.html
Resource
win11-20240709-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
WannaCry_ransomware_attack
-
Size
429KB
-
MD5
c01af42ed6d1d1fb865f266124533dba
-
SHA1
90860f160ade023ffc6171f7cebaa399b7760995
-
SHA256
e46d669202569d23a377958fbbbd6efae4d90a2251033095669a5fea4d481688
-
SHA512
cbb679ce9957d0a3895fa0ea6377fba71da9de4581a188b393dbd3ae89efe2746182b12a5f2240a9abaa83ddf860e7cce111c0328933aa7811ccefb759ef3ee6
-
SSDEEP
3072:P7+1l16LFIaZUynffVCMAul/cb9nnjtJd17X63cPYWk31KYsA30Y8uyvt2a9DJkQ:CCbWqcv2plKx7BPavWXDfEIfP
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3