Resubmissions

08-08-2024 19:16

240808-xy85vaxhkl 3

08-08-2024 15:19

240808-sqh68syfqa 10

General

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\TMRDTSelfExtract\HLUI\ScanPage\common\main.html

Ransom Note
Ransomware File Decryptor Anti-Ransomware Trend Micro experts help you decrypt your encrypted files Select the ransomware name Select the encrypted file or folder to start decrypting it Your selected files do not match. Please try again. Select your screen font color: Pleaes enter your personal decryption code: This scan can take significant time. DO NOT close this window or turn off your computer until the scan completes. IMPORTANT: Files encrypted with CryptXXX V3 cannot be completely recovered. Some parts of each file could be left encrypted. To repair your decrypted file, follow the guide on Trend Micro Support Website IMPORTANT: Files encrypted with Cerber cannot be completely recovered. Some parts of each file could be left encrypted. To repair your decrypted file, follow the guide on Trend Micro Support Website Some files need more information to continue. Click here. Scan Completed Duration: 00:00:00 Infected Files: 0 Decrypted Files: 0 See decrypted files Some files appear to be infected with CryptXXX V1. To continue, select any infected file (maximum file size recommended), and a non-infected copy of the same file. Make sure their file sizes are same. Some files appear to be infected with CryptXXX V1. To continue, select any infected file (maximum file size recommended), and a non-infected copy of the same file. Make sure their file sizes are same. Some files appear to be infected with CryptXXX V1. To continue, select any infected file (maximum file size recommended), and a non-infected copy of the same file. Make sure their file sizes are same. Some files appear to be infected with CryptXXX V1. To continue, select any infected file (maximum file size recommended), and a non-infected copy of the same file. Make sure their file sizes are same. Some files appear to be infected with CryptXXX V1. To continue, select any infected file (maximum file size recommended), and a non-infected copy of the same file. Make sure their file sizes are same. What‘s ID and Email? Your selected files do not match. Please try again. Trend Micro Support Website Feedback

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks