General
-
Target
TLauncher-2.899-Installer-1.3.1.exe
-
Size
25.4MB
-
Sample
241003-hgw2matckd
-
MD5
0e0716d2e4aac0bb178c261985acf33a
-
SHA1
bda605efc74046624e45e7185a1eef7304bab61d
-
SHA256
3640227b80b8742c811f8ef399ccf1018d21224920e76239136d569db12a6244
-
SHA512
53898b2801587b941c4e4896746da5b26d02f4e1418fca802407a802d4823578539cd02700a2fa7413c0f2170fe075d65553f433fd1b4f412b0707516364aeeb
-
SSDEEP
393216:725Ky/z18A7Q5+0cvfs/dQETVlOBbpFEjLsZqV56HpkBrr6of5MJ7ZWqxPAIgtMq:KKyL8+tHExiTZqqHpCrrKJBH5lFRq
Static task
static1
Behavioral task
behavioral1
Sample
TLauncher-2.899-Installer-1.3.1.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
TLauncher-2.899-Installer-1.3.1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
TLauncher-2.899-Installer-1.3.1.exe
-
Size
25.4MB
-
MD5
0e0716d2e4aac0bb178c261985acf33a
-
SHA1
bda605efc74046624e45e7185a1eef7304bab61d
-
SHA256
3640227b80b8742c811f8ef399ccf1018d21224920e76239136d569db12a6244
-
SHA512
53898b2801587b941c4e4896746da5b26d02f4e1418fca802407a802d4823578539cd02700a2fa7413c0f2170fe075d65553f433fd1b4f412b0707516364aeeb
-
SSDEEP
393216:725Ky/z18A7Q5+0cvfs/dQETVlOBbpFEjLsZqV56HpkBrr6of5MJ7ZWqxPAIgtMq:KKyL8+tHExiTZqqHpCrrKJBH5lFRq
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3