General
-
Target
kill.txt
-
Size
359B
-
Sample
240827-1pfzgsvdqr
-
MD5
98545754fe9fd338cd572f181ee12f8c
-
SHA1
2271521ad371e968f69c99b885edfed3b202066d
-
SHA256
d6cffdbabd9097ea78e00aad333491cb9add18e29ffb23a00f6d302bc0a8bd99
-
SHA512
53bed339b6c0d1d5b898e1ac6c39a07747a888375f86f44ce0c19f4848f28257dc3a512073feb74cedaab9baeab72bcb4ea79094f48f1042585bb45650c5e059
Static task
static1
Behavioral task
behavioral1
Sample
kill.txt
Resource
win10-20240611-en
Malware Config
Extracted
C:\Users\Admin\Downloads\RANSOMWARE-WANNACRY-2.0-master\RANSOMWARE-WANNACRY-2.0-master\Ransomware.WannaCry\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
kill.txt
-
Size
359B
-
MD5
98545754fe9fd338cd572f181ee12f8c
-
SHA1
2271521ad371e968f69c99b885edfed3b202066d
-
SHA256
d6cffdbabd9097ea78e00aad333491cb9add18e29ffb23a00f6d302bc0a8bd99
-
SHA512
53bed339b6c0d1d5b898e1ac6c39a07747a888375f86f44ce0c19f4848f28257dc3a512073feb74cedaab9baeab72bcb4ea79094f48f1042585bb45650c5e059
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3