General
-
Target
smokes_sewers_5.txt
-
Size
1KB
-
Sample
241211-w98g1stpgx
-
MD5
45956e8bb32007e05a2cdb32de1342d2
-
SHA1
491b5caf57436f25d242d2755bfef8c66f590c51
-
SHA256
2fef20b197e160969da400b4cb78e680f0504581e78dad123b555c6b190d0f3b
-
SHA512
0a02910df2d3ab63f3f8b298410843eaba2fedb3f650465e00e294b09615247d16f34362f76fa545dd252f2c5f280072c082b3a5f14a257e6699435b24704116
Static task
static1
Behavioral task
behavioral1
Sample
smokes_sewers_5.txt
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
smokes_sewers_5.txt
-
Size
1KB
-
MD5
45956e8bb32007e05a2cdb32de1342d2
-
SHA1
491b5caf57436f25d242d2755bfef8c66f590c51
-
SHA256
2fef20b197e160969da400b4cb78e680f0504581e78dad123b555c6b190d0f3b
-
SHA512
0a02910df2d3ab63f3f8b298410843eaba2fedb3f650465e00e294b09615247d16f34362f76fa545dd252f2c5f280072c082b3a5f14a257e6699435b24704116
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1