General
-
Target
Wallpaper.zip
-
Size
1.7MB
-
Sample
240729-p7rcdsyhqq
-
MD5
a66b6c0725433bb071089bb84bd0186c
-
SHA1
c45338281936074cab03d2bba30e899cae8df29c
-
SHA256
19a087166b899e4f6c63c76e3a8978a2429ed4e3f2479299c4b2a3f8872f6e3d
-
SHA512
3e93794fe6d7048a452a685d6a65457061467b8715fd59769db4f8d62141d95505a50135a7ecd5b3684f911b94d34320335de2bf71854dcc94a6d285b3ad9a6f
-
SSDEEP
49152:Rz5/rgN4ypUO9DJmePL4IFMt7wQmKX26ktvAxkulD7Gm6rD:N5zQQ+L4yQm8ZkuCGOm6rD
Static task
static1
Behavioral task
behavioral1
Sample
Wallpaper.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Wallpaper.jpg
Resource
win7-20240704-en
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
Wallpaper.zip
-
Size
1.7MB
-
MD5
a66b6c0725433bb071089bb84bd0186c
-
SHA1
c45338281936074cab03d2bba30e899cae8df29c
-
SHA256
19a087166b899e4f6c63c76e3a8978a2429ed4e3f2479299c4b2a3f8872f6e3d
-
SHA512
3e93794fe6d7048a452a685d6a65457061467b8715fd59769db4f8d62141d95505a50135a7ecd5b3684f911b94d34320335de2bf71854dcc94a6d285b3ad9a6f
-
SSDEEP
49152:Rz5/rgN4ypUO9DJmePL4IFMt7wQmKX26ktvAxkulD7Gm6rD:N5zQQ+L4yQm8ZkuCGOm6rD
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
Wallpaper.jpg
-
Size
1.7MB
-
MD5
fbc1ec46f422d917dfb19ca4e20f963e
-
SHA1
9eae41c1bd0f13786b101af0d0914dc780a0b00f
-
SHA256
df57305ce989d8261057e38313b535928955d9331d86b80439802fbf0fbc6776
-
SHA512
70e618857fb653ed79fcb6b4f8c89afa3b48a8542d1d945af1a2b0623e60d9f0a7461c223eee2b35232a4d87d32275ab584a20b84deedd2e1349606b88ad3e74
-
SSDEEP
49152:Id3C4LLGujE0qwt9936ihsJqtW/xH/CXOX5H6j/G:IdzLLGubq090/2WIeX5H6j/G
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3