General
-
Target
download (3).png
-
Size
2KB
-
Sample
240906-v74klszapj
-
MD5
8e3eccb3f88e46f4aa1605a462a9da7b
-
SHA1
5e18054a1090ebd04cf029db4c6d08b2bf50ca09
-
SHA256
3569af7e0af03514cc35cde5efa2e5fbd33c5494f3fa63b201c601c7e5b8656a
-
SHA512
9ce17b8cd5378889fac7fc3b208915233ac7260d7c510bd4c247d7a9940e50e508755c4f0c6bdd7c8ec010c391447db20d70c3dcddb939f76d6b0b1446c9059a
Static task
static1
Behavioral task
behavioral1
Sample
download (3).png
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
download (3).png
-
Size
2KB
-
MD5
8e3eccb3f88e46f4aa1605a462a9da7b
-
SHA1
5e18054a1090ebd04cf029db4c6d08b2bf50ca09
-
SHA256
3569af7e0af03514cc35cde5efa2e5fbd33c5494f3fa63b201c601c7e5b8656a
-
SHA512
9ce17b8cd5378889fac7fc3b208915233ac7260d7c510bd4c247d7a9940e50e508755c4f0c6bdd7c8ec010c391447db20d70c3dcddb939f76d6b0b1446c9059a
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
4