General
-
Target
vanish.exe
-
Size
19.1MB
-
Sample
240809-ecbckszdrb
-
MD5
675fac5cf2e97a8570df5e341d256393
-
SHA1
42479fc5a049475ec3acbe0aa41d353fe893640e
-
SHA256
c60a23a464eecfb19075a26d8141eac4297fa7e3870b9551a0cf7ec1094d5581
-
SHA512
05251e3b0196708f3d7f87359cbf9169f138b3bdcfc2589cf4a0a3dec9fae7d92fec0c5af40186bf3955e63f17e3627494d47ab60cce85584b3c39717586a826
-
SSDEEP
393216:xjdHrgwiX9lHYPYcgfSVfEBqU673pPI4vCc+dQSlbKxgm:xjVliTkYLS2Uh73pPIMpCQgmx
Static task
static1
Behavioral task
behavioral1
Sample
vanish.exe
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\Downloads\RANSOMWARE-WANNACRY-2.0-master\RANSOMWARE-WANNACRY-2.0-master\Ransomware.WannaCry\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
vanish.exe
-
Size
19.1MB
-
MD5
675fac5cf2e97a8570df5e341d256393
-
SHA1
42479fc5a049475ec3acbe0aa41d353fe893640e
-
SHA256
c60a23a464eecfb19075a26d8141eac4297fa7e3870b9551a0cf7ec1094d5581
-
SHA512
05251e3b0196708f3d7f87359cbf9169f138b3bdcfc2589cf4a0a3dec9fae7d92fec0c5af40186bf3955e63f17e3627494d47ab60cce85584b3c39717586a826
-
SSDEEP
393216:xjdHrgwiX9lHYPYcgfSVfEBqU673pPI4vCc+dQSlbKxgm:xjVliTkYLS2Uh73pPIMpCQgmx
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3