General
-
Target
sample
-
Size
267KB
-
Sample
241218-t4ydrawmdr
-
MD5
79c71a1177718da362083128aeddd237
-
SHA1
1496d4219e4266d0c609c93595c47d55a3fe375d
-
SHA256
0d3640ab26280297ecd40c7807f0c420fe376e3d32b59052279eb13a8fc9a7c4
-
SHA512
801244cd6d4a407d8c886803f5668ce1aaefec59d9f8c13a6a95654db847154419c8debe688f79248f218015ae7941f32bb4a7fc8830f607c2207bdabf3078ec
-
SSDEEP
3072:Rm/iwlwEq6DxoZw1ImA2l/R/h4w0yYGO0wImgrAwtN+Tl/j6q:Rm/j7jDxoZ2ImvRn0xGiITK6q
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win11-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
sample
-
Size
267KB
-
MD5
79c71a1177718da362083128aeddd237
-
SHA1
1496d4219e4266d0c609c93595c47d55a3fe375d
-
SHA256
0d3640ab26280297ecd40c7807f0c420fe376e3d32b59052279eb13a8fc9a7c4
-
SHA512
801244cd6d4a407d8c886803f5668ce1aaefec59d9f8c13a6a95654db847154419c8debe688f79248f218015ae7941f32bb4a7fc8830f607c2207bdabf3078ec
-
SSDEEP
3072:Rm/iwlwEq6DxoZw1ImA2l/R/h4w0yYGO0wImgrAwtN+Tl/j6q:Rm/j7jDxoZ2ImvRn0xGiITK6q
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (15294) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1