Resubmissions

26-09-2024 23:42

240926-3qeh6atgpq 10

30-08-2024 18:53

240830-xjrl9azhpn 10

30-08-2024 15:42

240830-s5d6tssfmm 10

30-08-2024 15:38

240830-s27c7s1gld 10

General

  • Target

    cb211e0f58c5a58b0a035936c7d86952_JaffaCakes118

  • Size

    5.0MB

  • Sample

    240830-xjrl9azhpn

  • MD5

    cb211e0f58c5a58b0a035936c7d86952

  • SHA1

    e256814cd2179c95a750bd2968acec788a41c8ff

  • SHA256

    0ddfe514fb8fc1f583db27be85c703fd17ffe5b196a448ec50da063ee51d21b3

  • SHA512

    9436d9d128f0234b14b853515bc2e7aadac2d921a2ac0517617d39c978bc6fc39887c76494b88475f372e98e361e3c77a5418455142dec243b77220e92c58757

  • SSDEEP

    98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5QMS1:TDqPe1Cxcxk3ZAEUad2

Malware Config

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      cb211e0f58c5a58b0a035936c7d86952_JaffaCakes118

    • Size

      5.0MB

    • MD5

      cb211e0f58c5a58b0a035936c7d86952

    • SHA1

      e256814cd2179c95a750bd2968acec788a41c8ff

    • SHA256

      0ddfe514fb8fc1f583db27be85c703fd17ffe5b196a448ec50da063ee51d21b3

    • SHA512

      9436d9d128f0234b14b853515bc2e7aadac2d921a2ac0517617d39c978bc6fc39887c76494b88475f372e98e361e3c77a5418455142dec243b77220e92c58757

    • SSDEEP

      98304:TDqPoBhz1aRxcSUDk36SAEdhvxWa9P5QMS1:TDqPe1Cxcxk3ZAEUad2

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Contacts a large (8862) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (321) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Drops desktop.ini file(s)

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks