General
-
Target
Ransomware.wannacry.exe.malz.7z
-
Size
3.4MB
-
Sample
240930-gyw8aavcpd
-
MD5
4d9c771619255c9b937c34b4c50cec7e
-
SHA1
55177cd9cefc6369db31b23e324d3263b4d4e6a6
-
SHA256
adb41a37499a6f0f5b1e58b1973367dd34a695293dc1fed601c79d21fd0754c1
-
SHA512
4f017c53bf0c04118ec535f12742b83ab19b1c8f741936c0811641c78264cee8df5a84f149391cd0b5c9a3e6f38f4155b067ca95c1e759d962882414197c6b60
-
SSDEEP
49152:nlUTH8fWrXRTyEAP/g4CJbErYlXxgx+E/epdYMaiEK3SFNjt4Jg87nIHOVLWF4k9:nlG8mh8gV56+NjaiEK3SFNjthk5I4W3N
Static task
static1
Behavioral task
behavioral1
Sample
Ransomware.wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ransomware.wannacry.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
Ransomware.wannacry.exe.malz
-
Size
3.6MB
-
MD5
db349b97c37d22f5ea1d1841e3c89eb4
-
SHA1
e889544aff85ffaf8b0d0da705105dee7c97fe26
-
SHA256
24d004a104d4d54034dbcffc2a4b19a11f39008a575aa614ea04703480b1022c
-
SHA512
d6c60b8f22f89cbd1262c0aa7ae240577a82002fb149e9127d4edf775a25abcda4e585b6113e79ab4a24bb65f4280532529c2f06f7ffe4d5db45c0caf74fea38
-
SSDEEP
98304:wDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3R:wDqPe1Cxcxk3ZAEUadzR8yc4gB
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (507) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1