General

  • Target

    WinCry.exe

  • Size

    25.0MB

  • Sample

    240802-axh6psvekn

  • MD5

    2f3f0fbdb7edd5bb5dd55f2a659163d6

  • SHA1

    b81b8f1a9425639335a8f540a6dd107523fe1fe7

  • SHA256

    5d0aca12e18047ebf796d6f50a96b4b6d335ffe1df936b2f4ab2c9ba409737a7

  • SHA512

    61f6a252a4b3d55cab534727a6a6efa0e7620b7bcde1990968870dca74b991e9a8bda3a1177e95a9fff1498d24bd93c1f4b50409d9bec96aad441647ccd3e325

  • SSDEEP

    393216:oomWVe3DAnGKZKuNK0SvAn9kaK6gaaNRZbC:ooLW0UoWB6g5NRZbC

Malware Config

Targets

    • Target

      WinCry.exe

    • Size

      25.0MB

    • MD5

      2f3f0fbdb7edd5bb5dd55f2a659163d6

    • SHA1

      b81b8f1a9425639335a8f540a6dd107523fe1fe7

    • SHA256

      5d0aca12e18047ebf796d6f50a96b4b6d335ffe1df936b2f4ab2c9ba409737a7

    • SHA512

      61f6a252a4b3d55cab534727a6a6efa0e7620b7bcde1990968870dca74b991e9a8bda3a1177e95a9fff1498d24bd93c1f4b50409d9bec96aad441647ccd3e325

    • SSDEEP

      393216:oomWVe3DAnGKZKuNK0SvAn9kaK6gaaNRZbC:ooLW0UoWB6g5NRZbC

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks