General
-
Target
ShareX_M33p4kiVmf.png
-
Size
156B
-
Sample
241115-zc4dks1jh1
-
MD5
2f4527f2c31d107f8de07b1f7ce29705
-
SHA1
7a3663aa52f0c2b4387dafeb83036753304315bb
-
SHA256
94cf8ea325e8803d06af20c86b4a4f5cb8e44337d596302ab3c869edbcea598c
-
SHA512
0d9682ecd2d16d221a43f7ae7d0da19ad1276d4425d31566825be981a543b4eda4845694c51ae452777d25c507241e96714b60643eabb768f8c78396070d1f45
Static task
static1
Behavioral task
behavioral1
Sample
ShareX_M33p4kiVmf.png
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
ShareX_M33p4kiVmf.png
-
Size
156B
-
MD5
2f4527f2c31d107f8de07b1f7ce29705
-
SHA1
7a3663aa52f0c2b4387dafeb83036753304315bb
-
SHA256
94cf8ea325e8803d06af20c86b4a4f5cb8e44337d596302ab3c869edbcea598c
-
SHA512
0d9682ecd2d16d221a43f7ae7d0da19ad1276d4425d31566825be981a543b4eda4845694c51ae452777d25c507241e96714b60643eabb768f8c78396070d1f45
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1