General
-
Target
The Stanley Parable Ultra Deluxe.exe
-
Size
635KB
-
Sample
241012-xvfdcswgmf
-
MD5
8f35a1321df52b17b58cefc3c65a7eb8
-
SHA1
e0b6c2acc51151b41931112c61f1fb9b0cf23b17
-
SHA256
bd3a1f9763990b580f5f9073e3e23f7dff6369d79c24fef32c9164fadb998374
-
SHA512
0544c578b2d1737e0125ddb1633026eb5b710c4273d232a6aadca870c8ce9cedf724c2a6d3c1f24d2dcd53e3e910dcd7058753ff775d129cfeeb36482605711f
-
SSDEEP
12288:Q7qTU7nJYOeAkvS3N88DOt6pD8Flrn7VCufAmPCRJ7dad85Qng3V2DGz//dwH+I9:Gq4JYOeAka3N88qBrn7BfZPwJ7dad85M
Static task
static1
Behavioral task
behavioral1
Sample
The Stanley Parable Ultra Deluxe.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
The Stanley Parable Ultra Deluxe.exe
-
Size
635KB
-
MD5
8f35a1321df52b17b58cefc3c65a7eb8
-
SHA1
e0b6c2acc51151b41931112c61f1fb9b0cf23b17
-
SHA256
bd3a1f9763990b580f5f9073e3e23f7dff6369d79c24fef32c9164fadb998374
-
SHA512
0544c578b2d1737e0125ddb1633026eb5b710c4273d232a6aadca870c8ce9cedf724c2a6d3c1f24d2dcd53e3e910dcd7058753ff775d129cfeeb36482605711f
-
SSDEEP
12288:Q7qTU7nJYOeAkvS3N88DOt6pD8Flrn7VCufAmPCRJ7dad85Qng3V2DGz//dwH+I9:Gq4JYOeAka3N88qBrn7BfZPwJ7dad85M
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1