Resubmissions
11-08-2024 18:50
240811-xg9eaasfln 811-08-2024 18:41
240811-xb31bawgma 811-08-2024 18:41
240811-xbw7rsscqp 111-08-2024 18:38
240811-w93xjasbrn 311-08-2024 18:17
240811-ww3plsvhra 611-08-2024 18:16
240811-wwlq4avhpb 111-08-2024 18:15
240811-wv93as1ejl 111-08-2024 17:52
240811-wf7cvszgmp 10General
-
Target
Screenshot 2024-08-06 212650.png
-
Size
302KB
-
Sample
240811-wf7cvszgmp
-
MD5
8215cf98ee78db9c15eb03c1d565f6f9
-
SHA1
03020983659e6d6c61631de0bfdec9a965ec5155
-
SHA256
ea717e5576dbd3052c3429470ad4f3bc9bae374d4b9cc7d1c0e68055ec810543
-
SHA512
8e16cdb25bd785bf11608fb983125f71394da0091fa9769ee8504194d0626fca1b66e08245ba6d52af1e498bc16635fcdaedf1dd6b4a77cf9a53d4cd5278a28e
-
SSDEEP
6144:Rl53DXhOKICpEkz40IFGtwyYCzGpvgrUz9iYdwYIsQ1IxxeTMuG:RlxXgKI2xzdqG1ZTrURnuRsdxxe8
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-08-06 212650.png
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
Screenshot 2024-08-06 212650.png
-
Size
302KB
-
MD5
8215cf98ee78db9c15eb03c1d565f6f9
-
SHA1
03020983659e6d6c61631de0bfdec9a965ec5155
-
SHA256
ea717e5576dbd3052c3429470ad4f3bc9bae374d4b9cc7d1c0e68055ec810543
-
SHA512
8e16cdb25bd785bf11608fb983125f71394da0091fa9769ee8504194d0626fca1b66e08245ba6d52af1e498bc16635fcdaedf1dd6b4a77cf9a53d4cd5278a28e
-
SSDEEP
6144:Rl53DXhOKICpEkz40IFGtwyYCzGpvgrUz9iYdwYIsQ1IxxeTMuG:RlxXgKI2xzdqG1ZTrURnuRsdxxe8
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
4Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1