General
-
Target
jk.txt
-
Size
4.8MB
-
Sample
241001-1kdzbsvhqc
-
MD5
7740e3d8ec8596c000c8aa454b189f70
-
SHA1
226341f5cc2fdd1d3c9077df74b3b75b578e14b2
-
SHA256
df069d61a48578ec720196c7d17f60872aa8988430c13965b9b95c4b8ea748be
-
SHA512
7000e1640907f38339ec54401f3435e6647df57deea7795664df8121e8212451713c3ac7b20bfc3ef3ac10606c376e56355d93e313ea2a5f104a2b37bc737627
-
SSDEEP
98304:pl2OfyzLdIvT/magEjgw9GE4tS1Duq/P5ksl+KuNFdo0LY8:MOvdgqjGVS1CqXJl+rtD
Static task
static1
Behavioral task
behavioral1
Sample
jk.txt
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
jk.txt
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
jk.txt
-
Size
4.8MB
-
MD5
7740e3d8ec8596c000c8aa454b189f70
-
SHA1
226341f5cc2fdd1d3c9077df74b3b75b578e14b2
-
SHA256
df069d61a48578ec720196c7d17f60872aa8988430c13965b9b95c4b8ea748be
-
SHA512
7000e1640907f38339ec54401f3435e6647df57deea7795664df8121e8212451713c3ac7b20bfc3ef3ac10606c376e56355d93e313ea2a5f104a2b37bc737627
-
SSDEEP
98304:pl2OfyzLdIvT/magEjgw9GE4tS1Duq/P5ksl+KuNFdo0LY8:MOvdgqjGVS1CqXJl+rtD
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
4