General
-
Target
ff1ed1c599b724d4c2ec9d886e4df3f695646add801e4a792dd280b424fb79a9.7z
-
Size
75KB
-
Sample
241219-ej1aaawrcw
-
MD5
64f5244103c0f250906cb924631aa939
-
SHA1
dac7489a1b398745f854d09526fe29594a418796
-
SHA256
413de79262e326c80f1ed67363f257c84d3f68c7463a9db0818e9d8968275f9b
-
SHA512
11be3cafc53bb1cdb8e3b23fd959e005e9f54f2de37c4364feed51ed51930ca6d75f3d8751f540eb8ac99039174d1697cb58b8556241d7e42070d51c7f5c18f7
-
SSDEEP
1536:hwGHypyaSu09w7u65qgKa9Of8DHUxf6Df1CxamPXU1JNe4sooMI9:hwaypyLy7uqkq0N0wU1LI9
Static task
static1
Behavioral task
behavioral1
Sample
ff1ed1c599b724d4c2ec9d886e4df3f695646add801e4a792dd280b424fb79a9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\WannaCry-main\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
ff1ed1c599b724d4c2ec9d886e4df3f695646add801e4a792dd280b424fb79a9
-
Size
138KB
-
MD5
d260d6b9db36e18e4d2c0cdc34b304f4
-
SHA1
257eff882ff6f479696a4adbb235adf25ebe41e6
-
SHA256
ff1ed1c599b724d4c2ec9d886e4df3f695646add801e4a792dd280b424fb79a9
-
SHA512
63f32b8cfc72d338e479e646232a7508bfc82ffb3a5a06b273da8fb167324cabf65d5944f68c5c948a2e581673bb00f3c31a69a891b95d620e98acda466694f7
-
SSDEEP
3072:/caqyte6LV77snHLLxtyyaXOqdPNbnhW4IxZx5kCZuubFrhU1wKKrONmM:/caBtV77snHRRY7PNNW4IxZ7zbC0rONh
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1