General

  • Target

    2BuVfqNL_400x400.jpg

  • Size

    4KB

  • Sample

    240810-1cdnlayfrr

  • MD5

    1308240a66224bde83dd2ea8a22828d4

  • SHA1

    b66ad9628e14fe2e099e4aac6851f1316f46ec58

  • SHA256

    67f9972005be1107407d1875f09086e779bc526a91ed18f95936eed046e600bb

  • SHA512

    232e534c82a021498b8f28a601eb3b8d5c7d169b796b95fedacf49ede9d5d18972989881d563c2b14c1aedcf9e6fbe5aa7e36a57e12183e4c9ac5d4d13610f88

  • SSDEEP

    96:b894vJh7WQiQaxFtFzoiJx5bL+nqYeuEnHs4L:IkizNLFzoY9zsO

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      2BuVfqNL_400x400.jpg

    • Size

      4KB

    • MD5

      1308240a66224bde83dd2ea8a22828d4

    • SHA1

      b66ad9628e14fe2e099e4aac6851f1316f46ec58

    • SHA256

      67f9972005be1107407d1875f09086e779bc526a91ed18f95936eed046e600bb

    • SHA512

      232e534c82a021498b8f28a601eb3b8d5c7d169b796b95fedacf49ede9d5d18972989881d563c2b14c1aedcf9e6fbe5aa7e36a57e12183e4c9ac5d4d13610f88

    • SSDEEP

      96:b894vJh7WQiQaxFtFzoiJx5bL+nqYeuEnHs4L:IkizNLFzoY9zsO

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (3303) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks