General
-
Target
COM SURROGATE.exe
-
Size
75KB
-
Sample
241220-wxxjzs1mb1
-
MD5
434f15cbdf67f504d1dbba4f87e59350
-
SHA1
13ae6a57dd92ea0235a82197133060b09d9509bd
-
SHA256
efa9b10e72da83e31499b2316fda23c106ec36d877f4d8bbd6c75bb8b3d9e67c
-
SHA512
abbb1052ada2d04f9fddb4085fe2ffb96b0acdfdfcc17c80bf68f27a1b3a47f815256c2b9616946f403552a5262aaafe34914292fa9582f67b254e9262ef23dc
-
SSDEEP
1536:O3un0Od36serzX4hckbHgjkVgjB6oY0xO0BJU64fUX8u:4unp6nrLKckbHgY0xO0BJUhcX8u
Behavioral task
behavioral1
Sample
COM SURROGATE.exe
Resource
win7-20240903-en
Malware Config
Extracted
xworm
hope-asia.gl.at.ply.gg:35710
-
Install_directory
%AppData%
-
install_file
System User.exe
Extracted
C:\Users\Admin\Documents\@[email protected]
wannacry
115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn
Targets
-
-
Target
COM SURROGATE.exe
-
Size
75KB
-
MD5
434f15cbdf67f504d1dbba4f87e59350
-
SHA1
13ae6a57dd92ea0235a82197133060b09d9509bd
-
SHA256
efa9b10e72da83e31499b2316fda23c106ec36d877f4d8bbd6c75bb8b3d9e67c
-
SHA512
abbb1052ada2d04f9fddb4085fe2ffb96b0acdfdfcc17c80bf68f27a1b3a47f815256c2b9616946f403552a5262aaafe34914292fa9582f67b254e9262ef23dc
-
SSDEEP
1536:O3un0Od36serzX4hckbHgjkVgjB6oY0xO0BJU64fUX8u:4unp6nrLKckbHgY0xO0BJUhcX8u
-
Detect Xworm Payload
-
Wannacry family
-
Xworm family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1