General
-
Target
MEME.webp
-
Size
18KB
-
Sample
240724-3qse1sxelb
-
MD5
05cb6281e633346f2ee720ef9de02c1f
-
SHA1
07387f166635eee28b6e75c09c09964cf062aed7
-
SHA256
9b68ddc3c6782d0d45003eff95901f47ec7efb0ddef6743b56ac1f29197dbb63
-
SHA512
8528458c4d80234fe79587943f6234123c31228bbc3c8ebd34f4cb94b8a4996c9ba431cdb4965b3ef61de45ea5e3540ba6ba07a4e452ddfc8b0542c045f488b7
-
SSDEEP
384:FC0oWTTXzBkf9tAeJwXk4/vRzzW0j32O9xgyxVH0MGKwDDuAAj4UJMesfOFFl1q:c0oyVicGwXk4HRm0ViyxVU7NuDrsG9U
Static task
static1
Behavioral task
behavioral1
Sample
MEME.webp
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
MEME.webp
Resource
win10v2004-20240709-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
MEME.webp
-
Size
18KB
-
MD5
05cb6281e633346f2ee720ef9de02c1f
-
SHA1
07387f166635eee28b6e75c09c09964cf062aed7
-
SHA256
9b68ddc3c6782d0d45003eff95901f47ec7efb0ddef6743b56ac1f29197dbb63
-
SHA512
8528458c4d80234fe79587943f6234123c31228bbc3c8ebd34f4cb94b8a4996c9ba431cdb4965b3ef61de45ea5e3540ba6ba07a4e452ddfc8b0542c045f488b7
-
SSDEEP
384:FC0oWTTXzBkf9tAeJwXk4/vRzzW0j32O9xgyxVH0MGKwDDuAAj4UJMesfOFFl1q:c0oyVicGwXk4HRm0ViyxVU7NuDrsG9U
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3