General
-
Target
2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi
-
Size
3.4MB
-
Sample
240906-ep46esvgkq
-
MD5
8527e996e89d6e1e220158a211277428
-
SHA1
39bf8abe621c655cc2e16bb3d2674c2941a9bd31
-
SHA256
b75e07a2ca36745225ccc73183c0378e2e8458c9634567c1e3e6c3ae665ce91f
-
SHA512
cb71275fe6858310f34deefc0d556bf66917e8fad4e59f6187152e16ef225aa79b8a8cbf9f15b42ec9ef26ed48ce62aad3b5b1babc3282aca6b5c7a3b1f08462
-
SSDEEP
98304:XqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:XqPe1Cxcxk3ZAEUadzR8yc4g
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
2024-09-06_8527e996e89d6e1e220158a211277428_wannacry_wapomi
-
Size
3.4MB
-
MD5
8527e996e89d6e1e220158a211277428
-
SHA1
39bf8abe621c655cc2e16bb3d2674c2941a9bd31
-
SHA256
b75e07a2ca36745225ccc73183c0378e2e8458c9634567c1e3e6c3ae665ce91f
-
SHA512
cb71275fe6858310f34deefc0d556bf66917e8fad4e59f6187152e16ef225aa79b8a8cbf9f15b42ec9ef26ed48ce62aad3b5b1babc3282aca6b5c7a3b1f08462
-
SSDEEP
98304:XqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:XqPe1Cxcxk3ZAEUadzR8yc4g
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3