General

  • Target

    AutoClicker.exe

  • Size

    770KB

  • Sample

    240817-rj1x2azcpb

  • MD5

    8ec745f9fc61219a1e93206b8ac60ca7

  • SHA1

    a0afda31cf816d602db7b4100282f0834149ca8f

  • SHA256

    eaf9ea8be164dce704db9b0d9c7eebbb04893c41469d118552c2ff82994cb2f9

  • SHA512

    f5cb13829ecb9a2cc3bf14e6a3eb2ab03c9f04ffc4aeb7fcd7dc75e39209d9e6a0d6b0f33edcc894c3eef03582d90f8aa9db4ef55bed984ae3e69f6717afe22b

  • SSDEEP

    12288:7aWzgMg7v3qnCiOErQohh0F4fCJ8lnyfQ8cFJwVnjqvDbh9Vp:OaHMv6CWrj/nyfQ8bnGrt9Vp

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      AutoClicker.exe

    • Size

      770KB

    • MD5

      8ec745f9fc61219a1e93206b8ac60ca7

    • SHA1

      a0afda31cf816d602db7b4100282f0834149ca8f

    • SHA256

      eaf9ea8be164dce704db9b0d9c7eebbb04893c41469d118552c2ff82994cb2f9

    • SHA512

      f5cb13829ecb9a2cc3bf14e6a3eb2ab03c9f04ffc4aeb7fcd7dc75e39209d9e6a0d6b0f33edcc894c3eef03582d90f8aa9db4ef55bed984ae3e69f6717afe22b

    • SSDEEP

      12288:7aWzgMg7v3qnCiOErQohh0F4fCJ8lnyfQ8cFJwVnjqvDbh9Vp:OaHMv6CWrj/nyfQ8bnGrt9Vp

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • System Binary Proxy Execution: wuauclt

      Abuse Wuauclt to proxy execution of malicious code.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks