General
-
Target
WannaCry
-
Size
283KB
-
Sample
241123-afgasaynbn
-
MD5
7e823efb362154954c11c0b118d1fec9
-
SHA1
3e3059e47ba9acd734748812b3492408c9eec8b6
-
SHA256
19ace24dfe3b683d2fd677f0caf1bff8be290b6e23ec5d4e3640e30ef0694215
-
SHA512
dd5eccc31fad6acce6df531ffad12c66c53bd20936d38692b4e9da02e7f2cabb053f7f42ba4dda79ffb224e5aabf58e1ea0f3823296ad4ad7091bd37fa0eaef3
-
SSDEEP
6144:BvslxpOL/saqkPV9FemLtcsDSsmwj9hvZJT3CqbMrhryf65NRPaCieMjAkvCJv1S:xslxpOL/saqkPV9FemLtcsDSsmwj9hvF
Static task
static1
Behavioral task
behavioral1
Sample
WannaCry
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
WannaCry
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
WannaCry
-
Size
283KB
-
MD5
7e823efb362154954c11c0b118d1fec9
-
SHA1
3e3059e47ba9acd734748812b3492408c9eec8b6
-
SHA256
19ace24dfe3b683d2fd677f0caf1bff8be290b6e23ec5d4e3640e30ef0694215
-
SHA512
dd5eccc31fad6acce6df531ffad12c66c53bd20936d38692b4e9da02e7f2cabb053f7f42ba4dda79ffb224e5aabf58e1ea0f3823296ad4ad7091bd37fa0eaef3
-
SSDEEP
6144:BvslxpOL/saqkPV9FemLtcsDSsmwj9hvZJT3CqbMrhryf65NRPaCieMjAkvCJv1S:xslxpOL/saqkPV9FemLtcsDSsmwj9hvF
-
Modifies WinLogon for persistence
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
6Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1