General
-
Target
WannaCrypt0r.zip
-
Size
164KB
-
Sample
240804-h6fe6szblr
-
MD5
3d81b4fb7c398992fe64541b87cb4371
-
SHA1
421cd4f856b14a854a06b4ee6104248c8cd981ed
-
SHA256
8aa9d7b903cf5dde5ac5920640395fa5b0dfef09a4da50e084b7552d8ec21ba1
-
SHA512
0b92b9b2d7026c00fa12b15fb2daa7ca493e8ce7e48e766b8e1e16d1c2a82cfdb5e4eafc82cddb1f6b5ec42a0422457565f510abacd06e0717a1ba74685f560c
-
SSDEEP
3072:TlbxwVWSrh1lhL2ryplP/X6OOKeRw+Ums1YElgGaPYwI1bwecpI7kzBrDUEbwg3o:Ou6oeU3uokeOvHS1d1+sNs8wbiWQN91K
Static task
static1
Behavioral task
behavioral1
Sample
WannaCrypt0r.zip
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_WannaCrypt0r.zip\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___KLMVF75E_.txt
cerber
http://xpcx6erilkjced3j.onion/815F-61C5-133F-0098-BBE6
http://xpcx6erilkjced3j.1n5mod.top/815F-61C5-133F-0098-BBE6
http://xpcx6erilkjced3j.19kdeh.top/815F-61C5-133F-0098-BBE6
http://xpcx6erilkjced3j.1mpsnr.top/815F-61C5-133F-0098-BBE6
http://xpcx6erilkjced3j.18ey8e.top/815F-61C5-133F-0098-BBE6
http://xpcx6erilkjced3j.17gcun.top/815F-61C5-133F-0098-BBE6
Targets
-
-
Target
WannaCrypt0r.zip
-
Size
164KB
-
MD5
3d81b4fb7c398992fe64541b87cb4371
-
SHA1
421cd4f856b14a854a06b4ee6104248c8cd981ed
-
SHA256
8aa9d7b903cf5dde5ac5920640395fa5b0dfef09a4da50e084b7552d8ec21ba1
-
SHA512
0b92b9b2d7026c00fa12b15fb2daa7ca493e8ce7e48e766b8e1e16d1c2a82cfdb5e4eafc82cddb1f6b5ec42a0422457565f510abacd06e0717a1ba74685f560c
-
SSDEEP
3072:TlbxwVWSrh1lhL2ryplP/X6OOKeRw+Ums1YElgGaPYwI1bwecpI7kzBrDUEbwg3o:Ou6oeU3uokeOvHS1d1+sNs8wbiWQN91K
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (1122) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
3Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1