General

  • Target

    4bf2d648bf901a9c4f26b43f85e26b6659e22657a3d308dea668de43fed2dfdb.exe

  • Size

    1.1MB

  • Sample

    240825-k24y3swckc

  • MD5

    39d6ec26690ffee2e74fb9694b30453c

  • SHA1

    85a689c84e3a6584ed2cfca6da05c54a7ebfeb18

  • SHA256

    4bf2d648bf901a9c4f26b43f85e26b6659e22657a3d308dea668de43fed2dfdb

  • SHA512

    184347e37d40f14b210dc5838b0894dcacd746a7af8e68846ebe0ab7794e5c8a24b8d3a2d276c8a06901fbab3fd13f8bca8da37617ecab198c75232d7aee086e

  • SSDEEP

    24576:dqwa7YmN2K1EFitGs4/ak66Z9c801j5F/:dF5mNl1YMPJ+9cF1jD/

Malware Config

Extracted

Family

xworm

C2

22.ip.gl.ply.gg:14520

Attributes
  • Install_directory

    %AppData%

  • install_file

    sv_chost.exe

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      4bf2d648bf901a9c4f26b43f85e26b6659e22657a3d308dea668de43fed2dfdb.exe

    • Size

      1.1MB

    • MD5

      39d6ec26690ffee2e74fb9694b30453c

    • SHA1

      85a689c84e3a6584ed2cfca6da05c54a7ebfeb18

    • SHA256

      4bf2d648bf901a9c4f26b43f85e26b6659e22657a3d308dea668de43fed2dfdb

    • SHA512

      184347e37d40f14b210dc5838b0894dcacd746a7af8e68846ebe0ab7794e5c8a24b8d3a2d276c8a06901fbab3fd13f8bca8da37617ecab198c75232d7aee086e

    • SSDEEP

      24576:dqwa7YmN2K1EFitGs4/ak66Z9c801j5F/:dF5mNl1YMPJ+9cF1jD/

    • Detect Xworm Payload

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks