General
-
Target
s.txt
-
Size
7B
-
Sample
241212-sp8qhazpdp
-
MD5
af5597c29467a96523a70787c319f4db
-
SHA1
aa5916ae7fd159a18b1b72ea905c757207e26689
-
SHA256
cd2eca3535741f27a8ae40c31b0c41d4057a7a7b912b33b9aed86485d1c84676
-
SHA512
4611f3df34c1afd9990007da6128c2d5c3c967909f9eed6d2dcb0161403c27ef10a5f2082723e70be79285d28a79a3bf06d9e849db285b643c8f3388840b8b5e
Static task
static1
Behavioral task
behavioral1
Sample
s.txt
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Targets
-
-
Target
s.txt
-
Size
7B
-
MD5
af5597c29467a96523a70787c319f4db
-
SHA1
aa5916ae7fd159a18b1b72ea905c757207e26689
-
SHA256
cd2eca3535741f27a8ae40c31b0c41d4057a7a7b912b33b9aed86485d1c84676
-
SHA512
4611f3df34c1afd9990007da6128c2d5c3c967909f9eed6d2dcb0161403c27ef10a5f2082723e70be79285d28a79a3bf06d9e849db285b643c8f3388840b8b5e
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1