General

  • Target

    file

  • Size

    9KB

  • Sample

    241016-sbdm7svhnc

  • MD5

    c2bb38ff0f2cff6c0d98f84289e1b847

  • SHA1

    7ba11bae265a8c377b61a6c256240edf84f650ba

  • SHA256

    3dbc74cdbc0b0e267a97e118407fb0143826835382a17a8cbd3298e4421d0aaf

  • SHA512

    d8fa6adc010de7229dfcf4a6f5485254bd12805f1ee4c1e41af30ba1b585dccd521ef1caa4d72e319bb66a4683739b0cae8cc4817260bc1c9dd826e0eb4bd10f

  • SSDEEP

    192:PN2x2BQEUYEnkfO9hRR4BISMhwXphez86mvyiN:AxBEGkf64BIF8ezyHN

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.WannaCry.zip\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw

Targets

    • Target

      file

    • Size

      9KB

    • MD5

      c2bb38ff0f2cff6c0d98f84289e1b847

    • SHA1

      7ba11bae265a8c377b61a6c256240edf84f650ba

    • SHA256

      3dbc74cdbc0b0e267a97e118407fb0143826835382a17a8cbd3298e4421d0aaf

    • SHA512

      d8fa6adc010de7229dfcf4a6f5485254bd12805f1ee4c1e41af30ba1b585dccd521ef1caa4d72e319bb66a4683739b0cae8cc4817260bc1c9dd826e0eb4bd10f

    • SSDEEP

      192:PN2x2BQEUYEnkfO9hRR4BISMhwXphez86mvyiN:AxBEGkf64BIF8ezyHN

    • Modifies WinLogon for persistence

    • UAC bypass

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • File and Directory Permissions Modification: Windows File and Directory Permissions Modification

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks