General
-
Target
alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg
-
Size
96KB
-
Sample
241114-ycv7jascrj
-
MD5
5a67b2ccd59a9026d7a65808e7fbe2b5
-
SHA1
d98c2e6d0d7746a4b8cb974bf3137a4b7815c8f0
-
SHA256
d0096ae477363291c2bd6307776c5674dfd0d6f718f0b99647f4d77d1f58117e
-
SHA512
bf8337c3d0db282e666908a66aecdddadd3910c993bdbf6ebe824296952e6f6caab5f9785c4a37777a1b0b03789db7864f60c9a04e6ea89cabf25359c64a1f88
-
SSDEEP
768:fNhjT3NZha5hyhai4CK/LZjtqjm4uHByznKM1++xW0+aE2OUb/scRuoxSa+EgQ:fzT3fha5hyhai4PLSy4p4gtHIEgQ
Static task
static1
Behavioral task
behavioral1
Sample
alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\WannaCry-master\WannaCry-master\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
alkaline_trio___2_by_letsplaysuicide_d5l988-fullview.jpg
-
Size
96KB
-
MD5
5a67b2ccd59a9026d7a65808e7fbe2b5
-
SHA1
d98c2e6d0d7746a4b8cb974bf3137a4b7815c8f0
-
SHA256
d0096ae477363291c2bd6307776c5674dfd0d6f718f0b99647f4d77d1f58117e
-
SHA512
bf8337c3d0db282e666908a66aecdddadd3910c993bdbf6ebe824296952e6f6caab5f9785c4a37777a1b0b03789db7864f60c9a04e6ea89cabf25359c64a1f88
-
SSDEEP
768:fNhjT3NZha5hyhai4CK/LZjtqjm4uHByznKM1++xW0+aE2OUb/scRuoxSa+EgQ:fzT3fha5hyhai4PLSy4p4gtHIEgQ
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1