General
-
Target
PowerPoint Presentation.exe
-
Size
3.9MB
-
Sample
241018-j8xb5swglb
-
MD5
65b4f971bda7abcb0bafd3c150d4c7fb
-
SHA1
04cb42549c57ace1fb3edb0a5dbdfeb3c3069fa8
-
SHA256
5f5ff4b40cbcaa1922811c43aaab17d6a71207e7775ed8bc68ae47a4463eb7be
-
SHA512
3942f9821ba9d80480d06d9eb3f76fdb63e302e0ccedbf7601bc3235bfab68703f5b30685726aafe5adcb0816118d696949d452498fc57c4799262e477b483df
-
SSDEEP
98304:E7NUcuNI0SaX/IdKH0Jxbxz9kqXf0Fh+Ev7Z8vpXS5:E7NF73g/IfJxbxBkSIh+Ev7mRS
Static task
static1
Behavioral task
behavioral1
Sample
PowerPoint Presentation.exe
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
PowerPoint Presentation.exe
-
Size
3.9MB
-
MD5
65b4f971bda7abcb0bafd3c150d4c7fb
-
SHA1
04cb42549c57ace1fb3edb0a5dbdfeb3c3069fa8
-
SHA256
5f5ff4b40cbcaa1922811c43aaab17d6a71207e7775ed8bc68ae47a4463eb7be
-
SHA512
3942f9821ba9d80480d06d9eb3f76fdb63e302e0ccedbf7601bc3235bfab68703f5b30685726aafe5adcb0816118d696949d452498fc57c4799262e477b483df
-
SSDEEP
98304:E7NUcuNI0SaX/IdKH0Jxbxz9kqXf0Fh+Ev7Z8vpXS5:E7NF73g/IfJxbxBkSIh+Ev7mRS
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1