General
-
Target
140100869.jpg
-
Size
9KB
-
Sample
240804-smh23asepa
-
MD5
30a82171d89774f75563206c46d806a7
-
SHA1
088ac743d6aacff4b482016f5b6536d5ed94ef95
-
SHA256
b9cf6f7bc9268493bb44df05cdddefba46df39de06eedec050977de6eec3c56a
-
SHA512
80c79686a74ab7d0890fc3e96e7633e084bc4c580e4979f102e168fd9528cecd749c9371cf2d37dd1203df8ffdd224842bf36aa5fe2e33e9d75a6ba646e8f20e
-
SSDEEP
192:bIyVLN0+ag5AyBq5KsHWwKJFOlChed9vetKb3fxIMsikxpECmQncPo0rQfi:UKFpAkvs3K/He9GtKbfxILHxxmvQSv
Static task
static1
Behavioral task
behavioral1
Sample
140100869.jpg
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
140100869.jpg
-
Size
9KB
-
MD5
30a82171d89774f75563206c46d806a7
-
SHA1
088ac743d6aacff4b482016f5b6536d5ed94ef95
-
SHA256
b9cf6f7bc9268493bb44df05cdddefba46df39de06eedec050977de6eec3c56a
-
SHA512
80c79686a74ab7d0890fc3e96e7633e084bc4c580e4979f102e168fd9528cecd749c9371cf2d37dd1203df8ffdd224842bf36aa5fe2e33e9d75a6ba646e8f20e
-
SSDEEP
192:bIyVLN0+ag5AyBq5KsHWwKJFOlChed9vetKb3fxIMsikxpECmQncPo0rQfi:UKFpAkvs3K/He9GtKbfxILHxxmvQSv
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
5Subvert Trust Controls
1SIP and Trust Provider Hijacking
1