General
-
Target
Screenshot 2025-01-10 185717.png
-
Size
5KB
-
Sample
250113-2d3jsa1rdk
-
MD5
e67033504810204d124433a8c958b9a8
-
SHA1
eeabb0c754e277b1fc0e4c3a7324dcbcd88b255f
-
SHA256
4ea8a10216467c41d47aa6008f31d650c74918a3c7de8dd8b5a57de66aca4cba
-
SHA512
260869b12895115484279765eae89c205426accbb75efa1c63063ae9458de4a94f1579ffc6990ef9e67d74f5a3c7479d20994620fdba2c12b3c5446245048353
-
SSDEEP
96:Qm3jh54FmrQZYnWFLANVbwxEZEHJhGwllZvf8cGG+RYRRm39qoLwi8vY6:5Th+FJFYVbsEZiSwlrvf8nbRYc0jiWN
Static task
static1
Behavioral task
behavioral1
Sample
Screenshot 2025-01-10 185717.png
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
Screenshot 2025-01-10 185717.png
-
Size
5KB
-
MD5
e67033504810204d124433a8c958b9a8
-
SHA1
eeabb0c754e277b1fc0e4c3a7324dcbcd88b255f
-
SHA256
4ea8a10216467c41d47aa6008f31d650c74918a3c7de8dd8b5a57de66aca4cba
-
SHA512
260869b12895115484279765eae89c205426accbb75efa1c63063ae9458de4a94f1579ffc6990ef9e67d74f5a3c7479d20994620fdba2c12b3c5446245048353
-
SSDEEP
96:Qm3jh54FmrQZYnWFLANVbwxEZEHJhGwllZvf8cGG+RYRRm39qoLwi8vY6:5Th+FJFYVbsEZiSwlrvf8nbRYc0jiWN
-
Cryptolocker family
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (54) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1