General
-
Target
avg_antivirus_free_setup.exe
-
Size
229KB
-
Sample
240718-w2r53atfmd
-
MD5
17b75739e76022b30f1f568192c30db2
-
SHA1
671422d2ebb2fd87ecd48743cc0f679564ae6502
-
SHA256
6174b78835db0d54f99b53df75f5f2a4f7294e35c404448f55069a78047e259e
-
SHA512
978aaac3772e57dcdfeb0f1bd4a053297cd7723a1c4cce1dd35937952124d01cfefb56a8d5f45acea899ffe57f734152b6fc6a522134a5558a026cd402931e88
-
SSDEEP
3072:A2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhXK0K3:A0KgGwHqwOOELha+sm2D2+UhngN9K4a
Static task
static1
Behavioral task
behavioral1
Sample
avg_antivirus_free_setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
avg_antivirus_free_setup.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
avg_antivirus_free_setup.exe
-
Size
229KB
-
MD5
17b75739e76022b30f1f568192c30db2
-
SHA1
671422d2ebb2fd87ecd48743cc0f679564ae6502
-
SHA256
6174b78835db0d54f99b53df75f5f2a4f7294e35c404448f55069a78047e259e
-
SHA512
978aaac3772e57dcdfeb0f1bd4a053297cd7723a1c4cce1dd35937952124d01cfefb56a8d5f45acea899ffe57f734152b6fc6a522134a5558a026cd402931e88
-
SSDEEP
3072:A2RaiKg4xmUh1WXHqw/l+qmOELhakVsm3mxB32tLEv8zfdn5f2dZLCoKOhhXK0K3:A0KgGwHqwOOELha+sm2D2+UhngN9K4a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Uses Session Manager for persistence
Creates Session Manager registry key to run executable early in system boot.
-
Drops startup file
-
Impair Defenses: Safe Mode Boot
-
Modifies file permissions
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1