General
-
Target
stores.txt
-
Size
1KB
-
Sample
240823-tz8nxsvfpg
-
MD5
6b55095808302a0ef4cea2e699b1e559
-
SHA1
056301d5b0a03f39c1f438145c1a477faa783268
-
SHA256
6fa8c03179c6c10c6cb756908e7d6bc690d16d46d29b4f0dd5018511cd0fcaf3
-
SHA512
c135759ff1dfd6d6fc169e477c4ec6ea2dda743ef87ae36a2ad6f7581182ca5f504b22637999882a156dbd683bffd98657b2526952daae8a3cb5405dcbfa2daa
Static task
static1
Behavioral task
behavioral1
Sample
stores.txt
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
stores.txt
-
Size
1KB
-
MD5
6b55095808302a0ef4cea2e699b1e559
-
SHA1
056301d5b0a03f39c1f438145c1a477faa783268
-
SHA256
6fa8c03179c6c10c6cb756908e7d6bc690d16d46d29b4f0dd5018511cd0fcaf3
-
SHA512
c135759ff1dfd6d6fc169e477c4ec6ea2dda743ef87ae36a2ad6f7581182ca5f504b22637999882a156dbd683bffd98657b2526952daae8a3cb5405dcbfa2daa
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3