General
-
Target
2024-08-12_c7c6e1faf074d34ec4c3b36eaa418a79_wannacry
-
Size
3.4MB
-
Sample
240812-cv2w5svglg
-
MD5
c7c6e1faf074d34ec4c3b36eaa418a79
-
SHA1
6f6f0af9ef3bcf2e0e0c3cd8469f28c4e6a7cd7d
-
SHA256
870922d4cb3b5c9a2da234a52c36e0cb009968963771e08fbaa7a9c3f92fab14
-
SHA512
25953b65f40e3c9497f3c1143efb0b72580803cf64828f2a3ef4b05c8277d1479c0fc5afc421eaa9cf17616a631da23cb4bcf3a63d012cd17c3f988336c5b35a
-
SSDEEP
98304:2qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g36:2qPe1Cxcxk3ZAEUadzR8yc4gK
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-12_c7c6e1faf074d34ec4c3b36eaa418a79_wannacry.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-08-12_c7c6e1faf074d34ec4c3b36eaa418a79_wannacry.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
2024-08-12_c7c6e1faf074d34ec4c3b36eaa418a79_wannacry
-
Size
3.4MB
-
MD5
c7c6e1faf074d34ec4c3b36eaa418a79
-
SHA1
6f6f0af9ef3bcf2e0e0c3cd8469f28c4e6a7cd7d
-
SHA256
870922d4cb3b5c9a2da234a52c36e0cb009968963771e08fbaa7a9c3f92fab14
-
SHA512
25953b65f40e3c9497f3c1143efb0b72580803cf64828f2a3ef4b05c8277d1479c0fc5afc421eaa9cf17616a631da23cb4bcf3a63d012cd17c3f988336c5b35a
-
SSDEEP
98304:2qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g36:2qPe1Cxcxk3ZAEUadzR8yc4gK
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3