General

  • Target

    cmd.bat

  • Size

    2KB

  • Sample

    241014-yj29estalh

  • MD5

    c63b0bd10a788d38732185b119116f84

  • SHA1

    b30038a501aee3db950b972779b230bea5eee589

  • SHA256

    784403081f9a839188a4543676894a2d5a9e59ecb9c7038523866c9d054afe9a

  • SHA512

    5a599505320830a0c539932b96c65add2f9493dd0e351b9ead48f11bca8acb01c30d9883988f4503dae4e9e36e6e3a1b454f00bb711a44809965b30757cd8048

Malware Config

Extracted

Path

C:\Users\Admin\Documents\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Targets

    • Target

      cmd.bat

    • Size

      2KB

    • MD5

      c63b0bd10a788d38732185b119116f84

    • SHA1

      b30038a501aee3db950b972779b230bea5eee589

    • SHA256

      784403081f9a839188a4543676894a2d5a9e59ecb9c7038523866c9d054afe9a

    • SHA512

      5a599505320830a0c539932b96c65add2f9493dd0e351b9ead48f11bca8acb01c30d9883988f4503dae4e9e36e6e3a1b454f00bb711a44809965b30757cd8048

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks