General
-
Target
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c
-
Size
3.4MB
-
Sample
240826-1lebgsxana
-
MD5
9e8e36905352f9702d94c1f9a2b6f1bb
-
SHA1
57ab6ad8fb7878ac3d405cc959140b9d72e5722c
-
SHA256
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c
-
SHA512
fde334533b71802e5cbd43fb2079e8d8cb577861184bb90c975d9df64c5c162e3b729f5f555cb1dbccad55fed1129b02c275a4b3706d40ddb5d7e6a1f3571a97
-
SSDEEP
98304:QePoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QePe1Cxcxk3ZAEUadzR8yc4gB
Static task
static1
Behavioral task
behavioral1
Sample
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
14HthR295amhvjdH8qS229FNv2LHyKFJYv
Targets
-
-
Target
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c
-
Size
3.4MB
-
MD5
9e8e36905352f9702d94c1f9a2b6f1bb
-
SHA1
57ab6ad8fb7878ac3d405cc959140b9d72e5722c
-
SHA256
498f71e2b35fa0e8f1b7675da2e9d94c0528ff5a3edfb65d54338510a95f797c
-
SHA512
fde334533b71802e5cbd43fb2079e8d8cb577861184bb90c975d9df64c5c162e3b729f5f555cb1dbccad55fed1129b02c275a4b3706d40ddb5d7e6a1f3571a97
-
SSDEEP
98304:QePoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QePe1Cxcxk3ZAEUadzR8yc4gB
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3