Resubmissions

26-09-2024 23:37

240926-3l63lstfmr 3

02-09-2024 20:39

240902-zfkqmswglm 10

General

  • Target

    3dgifmaker63234.gif

  • Size

    267KB

  • Sample

    240902-zfkqmswglm

  • MD5

    bcbc07c653758f78320d848c316c4670

  • SHA1

    5f71d39154823280999538171e66566a08bfe51f

  • SHA256

    0efef610a555393bf5661164a7f8c184b9f162a4a71e3be0070fb5aa3cdc0f06

  • SHA512

    095abf1540175a5807a65aeff4ea69ed09af5a595211724dce28d933f997fdf8a73dec9d1425997f20cbf5300038fffbeebeb10bf02537c8f5cf40fc051ec678

  • SSDEEP

    6144:SI62dlleAYK6Oj6GZTEdTw0RMylnzyqcwrQC:Sh24KZZ5uRxxd

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\WannaCry-main\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      3dgifmaker63234.gif

    • Size

      267KB

    • MD5

      bcbc07c653758f78320d848c316c4670

    • SHA1

      5f71d39154823280999538171e66566a08bfe51f

    • SHA256

      0efef610a555393bf5661164a7f8c184b9f162a4a71e3be0070fb5aa3cdc0f06

    • SHA512

      095abf1540175a5807a65aeff4ea69ed09af5a595211724dce28d933f997fdf8a73dec9d1425997f20cbf5300038fffbeebeb10bf02537c8f5cf40fc051ec678

    • SSDEEP

      6144:SI62dlleAYK6Oj6GZTEdTw0RMylnzyqcwrQC:Sh24KZZ5uRxxd

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks