Resubmissions
07-10-2024 19:03
241007-xqldtavhra 627-09-2024 23:46
240927-3samzsybkf 827-09-2024 23:14
240927-28aggsxbnh 1027-09-2024 23:12
240927-26vpmsvbjk 827-09-2024 20:13
240927-yzes3axdnk 827-09-2024 20:12
240927-yy349sxdmm 327-09-2024 20:10
240927-yxq4bazcma 327-09-2024 20:02
240927-yr5drazaqf 827-09-2024 19:59
240927-yqh45axamm 327-09-2024 19:56
240927-ynwx7swhll 3General
-
Target
Screenshot 2024-09-24 2.11.17 PM.png
-
Size
45KB
-
Sample
240927-28aggsxbnh
-
MD5
578c76503d19e73f7a935cdfb1a4108e
-
SHA1
74644b49ebeb844cfa821fe70251f8e56ac6e112
-
SHA256
3e5e23c0adf484b96a726f9ecdbd4a3089ad7f8979329616b73e521825e183ae
-
SHA512
52b1cb29234be0e46a90cc26f8ac9ad6ff45887f80fbaf20da53bce7c9530111778317aaa393e6e94fe97f3f15372a0de869f709e768f278bd74ba989599ca0d
-
SSDEEP
768:54PXdrAREaTeqsZ+93ArVC7UpbJss0JAKEKFXsojUIFI5A29+FKn2g5Fh2O:54Pa1swmfNIOKEKSY29tnxhz
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2024-09-24 2.11.17 PM.png
Resource
win11-20240802-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
Screenshot 2024-09-24 2.11.17 PM.png
-
Size
45KB
-
MD5
578c76503d19e73f7a935cdfb1a4108e
-
SHA1
74644b49ebeb844cfa821fe70251f8e56ac6e112
-
SHA256
3e5e23c0adf484b96a726f9ecdbd4a3089ad7f8979329616b73e521825e183ae
-
SHA512
52b1cb29234be0e46a90cc26f8ac9ad6ff45887f80fbaf20da53bce7c9530111778317aaa393e6e94fe97f3f15372a0de869f709e768f278bd74ba989599ca0d
-
SSDEEP
768:54PXdrAREaTeqsZ+93ArVC7UpbJss0JAKEKFXsojUIFI5A29+FKn2g5Fh2O:54Pa1swmfNIOKEKSY29tnxhz
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Indicator Removal
1File Deletion
1Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1