Resubmissions
16-10-2024 19:35
241016-yam35sybkd 10General
-
Target
shitting slander.mp4
-
Size
6.6MB
-
Sample
241016-yam35sybkd
-
MD5
828c056e04acd9a83e57815943314c4e
-
SHA1
c5a76db7258b6489702613d8a44487c9a2e66780
-
SHA256
0051fa06a995e0daaa5d8d3a6aded51a32975cc3b2e5f38b5a45c3847501958e
-
SHA512
e86ff8a95cd743fd3d5d9c13f0f46ea7828b1e871dfed8823d91ba82b84c774ed1ad37ef2a844cc3dfd3b7b3e4911ce69731d3b3d4947ad37fde5140877cf523
-
SSDEEP
196608:YstmfvCUlMA+srvnQmtoOBTWcReW4fm11JqzgCkVL2:ayU1+0nQmtXWc0W4fm1H4gCk92
Static task
static1
Behavioral task
behavioral1
Sample
shitting slander.mp4
Resource
win10-20240404-en
Malware Config
Extracted
C:\Users\Admin\Downloads\RANSOMWARE-WANNACRY-2.0-master\RANSOMWARE-WANNACRY-2.0-master\Ransomware.WannaCry\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
shitting slander.mp4
-
Size
6.6MB
-
MD5
828c056e04acd9a83e57815943314c4e
-
SHA1
c5a76db7258b6489702613d8a44487c9a2e66780
-
SHA256
0051fa06a995e0daaa5d8d3a6aded51a32975cc3b2e5f38b5a45c3847501958e
-
SHA512
e86ff8a95cd743fd3d5d9c13f0f46ea7828b1e871dfed8823d91ba82b84c774ed1ad37ef2a844cc3dfd3b7b3e4911ce69731d3b3d4947ad37fde5140877cf523
-
SSDEEP
196608:YstmfvCUlMA+srvnQmtoOBTWcReW4fm11JqzgCkVL2:ayU1+0nQmtXWc0W4fm1H4gCk92
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1