General
-
Target
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f
-
Size
3.4MB
-
Sample
241102-t9kpvazeqr
-
MD5
c4edc29dee2a74fa1bb461dbdc1a672c
-
SHA1
83b4f05ef3bed190153e6fca51fef311b9bc1c5c
-
SHA256
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f
-
SHA512
668527e5c172837ae708688ea6713cf22ede984ee6c90e19ed1fdd73e2cb20d198008be01a0ee2a5a493f07427ffc2771efd0fc2c2a50ddbfcb104a869e48410
-
SSDEEP
98304:2qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:2qPe1Cxcxk3ZAEUadzR8yc4g
Static task
static1
Behavioral task
behavioral1
Sample
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f
-
Size
3.4MB
-
MD5
c4edc29dee2a74fa1bb461dbdc1a672c
-
SHA1
83b4f05ef3bed190153e6fca51fef311b9bc1c5c
-
SHA256
902ab71895adf1f8fb6c414350f048aa89835e7ae4583e14e340eb21b92d759f
-
SHA512
668527e5c172837ae708688ea6713cf22ede984ee6c90e19ed1fdd73e2cb20d198008be01a0ee2a5a493f07427ffc2771efd0fc2c2a50ddbfcb104a869e48410
-
SSDEEP
98304:2qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3:2qPe1Cxcxk3ZAEUadzR8yc4g
-
Bdaejec family
-
Detects Bdaejec Backdoor.
Bdaejec is backdoor written in C++.
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1