General

  • Target

    wildfire-test-pe-file.exe

  • Size

    54KB

  • Sample

    241114-afas1asanq

  • MD5

    a01913203fc4c42d7e05bc8135ddcc24

  • SHA1

    f6a792542cbe386d559700d452f7aea9617325c8

  • SHA256

    9646a1e1b53f02e6b7d559ea0128e7c3f9c76378e02e3e8734064a9df7675cc8

  • SHA512

    50ff3c475cc7b120d0dc2761a2aae118d4d33efc0185001f3ecc2d3508778eef4d0bd2a9a057593bc5f6ba29462c219204b7be2a426f6944e3e394bae93c7635

  • SSDEEP

    768:9/EAAqxG0QqLccK+xL7scaOZ/IcGs8WbwnWh+6AXT2qEDnXbiPGEDUXnpT0rJmnU:CAc0QqgHW7/ZwcF8c6jELX+PupTNj

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      wildfire-test-pe-file.exe

    • Size

      54KB

    • MD5

      a01913203fc4c42d7e05bc8135ddcc24

    • SHA1

      f6a792542cbe386d559700d452f7aea9617325c8

    • SHA256

      9646a1e1b53f02e6b7d559ea0128e7c3f9c76378e02e3e8734064a9df7675cc8

    • SHA512

      50ff3c475cc7b120d0dc2761a2aae118d4d33efc0185001f3ecc2d3508778eef4d0bd2a9a057593bc5f6ba29462c219204b7be2a426f6944e3e394bae93c7635

    • SSDEEP

      768:9/EAAqxG0QqLccK+xL7scaOZ/IcGs8WbwnWh+6AXT2qEDnXbiPGEDUXnpT0rJmnU:CAc0QqgHW7/ZwcF8c6jELX+PupTNj

    • CryptoLocker

      Ransomware family with multiple variants.

    • Cryptolocker family

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (107) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Sets service image path in registry

    • A potential corporate email address has been identified in the URL: [email protected]

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks