Overview
overview
10Static
static
7BitchTits ...P].exe
windows7-x64
7WannaFartCry.exe
windows7-x64
3Wannashiturself.exe
windows7-x64
10big FAT ti...RE.exe
windows7-x64
10big fat se...re.exe
windows7-x64
1bitch man ...re.exe
windows7-x64
8bro what t...at.dll
windows7-x64
7cocksucker...L].exe
windows7-x64
7fart poopy...re.exe
windows7-x64
7fart weewe...re.exe
windows7-x64
10farting po...re.exe
windows7-x64
10farty poo ...re.exe
windows7-x64
10fuck you.exe
windows7-x64
7large peni...24.exe
windows7-x64
niggaware ...29.exe
windows7-x64
10pee poo pi...re.exe
windows7-x64
10retard ransomware.exe
windows7-x64
1Analysis
-
max time kernel
421s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 14:23
Behavioral task
behavioral1
Sample
BitchTits Ransomware [VIP].exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WannaFartCry.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
Wannashiturself.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
big FAT tits RANSOMWARE.exe
Resource
win7-20240704-en
Behavioral task
behavioral5
Sample
big fat sexy dildo poop ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
bitch man ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
bro what the fuckkk ur seriously beliving that.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
cocksucker ransomware [COOL].exe
Resource
win7-20240704-en
Behavioral task
behavioral9
Sample
fart poopy ransowmare.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
fart weewee ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral11
Sample
farting poop sex ransomware.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
farty poo poo ransomware.exe
Resource
win7-20240705-en
Behavioral task
behavioral13
Sample
fuck you.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
large penis ransomware 2024.exe
Resource
win7-20240704-en
Behavioral task
behavioral15
Sample
niggaware ransomware in 2029.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
pee poo piss piss ransomware rare.exe
Resource
win7-20240705-en
Behavioral task
behavioral17
Sample
retard ransomware.exe
Resource
win7-20240705-en
General
-
Target
Wannashiturself.exe
-
Size
396KB
-
MD5
c419d3769a7b6c21e039a2f8bf3b8a7e
-
SHA1
710aae63e6b98e54f7269305e0d8d45defb9292f
-
SHA256
a64b4ec712a97ddc55f187cdd899ce00b3283992cbfa91d9e88647e61f62f693
-
SHA512
e7ded4bd334922752e3dc244c150ce05afc8c7ea3a90624d98ed89d003a8a47ab156c1f58ff58a4268b2fef8952f2651a4b6cd2b1952e7dd8a01126c1f065de8
-
SSDEEP
6144:A4nR2vxBCQjXJeKA7Eqe+D5IXo5IbFKVGW2QamiglBsvJR7M3imZIQ90:b2bCwXke+DuXrpGdPI7M/o
Malware Config
Signatures
-
Processes:
Wannashiturself.exe043A6AEB00014973000BD86DB4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe -
Disables taskbar notifications via registry modification
-
Deletes itself 1 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exepid process 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Executes dropped EXE 1 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exepid process 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Loads dropped DLL 4 IoCs
Processes:
Wannashiturself.exe043A6AEB00014973000BD86DB4EB2331.exepid process 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Processes:
Wannashiturself.exe043A6AEB00014973000BD86DB4EB2331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Wannashiturself.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Wannashiturself.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc Wannashiturself.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 043A6AEB00014973000BD86DB4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc 043A6AEB00014973000BD86DB4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000BD86DB4EB2331 = "C:\\ProgramData\\043A6AEB00014973000BD86DB4EB2331\\043A6AEB00014973000BD86DB4EB2331.exe" 043A6AEB00014973000BD86DB4EB2331.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Wannashiturself.exe043A6AEB00014973000BD86DB4EB2331.exepid process 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2388 Wannashiturself.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exepid process 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exepid process 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
043A6AEB00014973000BD86DB4EB2331.exepid process 2224 043A6AEB00014973000BD86DB4EB2331.exe 2224 043A6AEB00014973000BD86DB4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Wannashiturself.exedescription pid process target process PID 2388 wrote to memory of 2224 2388 Wannashiturself.exe 043A6AEB00014973000BD86DB4EB2331.exe PID 2388 wrote to memory of 2224 2388 Wannashiturself.exe 043A6AEB00014973000BD86DB4EB2331.exe PID 2388 wrote to memory of 2224 2388 Wannashiturself.exe 043A6AEB00014973000BD86DB4EB2331.exe PID 2388 wrote to memory of 2224 2388 Wannashiturself.exe 043A6AEB00014973000BD86DB4EB2331.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Wannashiturself.exe"C:\Users\Admin\AppData\Local\Temp\Wannashiturself.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe"C:\ProgramData\043A6AEB00014973000BD86DB4EB2331\043A6AEB00014973000BD86DB4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\Wannashiturself.exe"2⤵
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD5c419d3769a7b6c21e039a2f8bf3b8a7e
SHA1710aae63e6b98e54f7269305e0d8d45defb9292f
SHA256a64b4ec712a97ddc55f187cdd899ce00b3283992cbfa91d9e88647e61f62f693
SHA512e7ded4bd334922752e3dc244c150ce05afc8c7ea3a90624d98ed89d003a8a47ab156c1f58ff58a4268b2fef8952f2651a4b6cd2b1952e7dd8a01126c1f065de8