General
-
Target
IMG_0163.jpeg
-
Size
18KB
-
Sample
250116-vcchmszqfq
-
MD5
75bdc13dc0b5e231a2961f694d1606fd
-
SHA1
ed92df0ea92fb4ac3499d5f2fe90d2e09cb964ef
-
SHA256
b8b8c13ef4144e69fc4bbfd729d9bfea22fc4baa21808e76815cd5b16768ed64
-
SHA512
71948be0cf77730a99fb6163c4878dbe659714cff6a7525929ce99de90060bc3b01002fd176712ec11d10629bb4735595c850c52cb3a7922cceb82065b05ca7d
-
SSDEEP
384:i8XQ2j+XkW1F5/jMRsy0FmLTtnIjYgRx52Tv7frYXtHFqU9sCaK6f9SFwe:i8Ud1n/jj3FmRSYckb7MtHPzaP7e
Static task
static1
Behavioral task
behavioral1
Sample
IMG_0163.jpg
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\Downloads\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Targets
-
-
Target
IMG_0163.jpeg
-
Size
18KB
-
MD5
75bdc13dc0b5e231a2961f694d1606fd
-
SHA1
ed92df0ea92fb4ac3499d5f2fe90d2e09cb964ef
-
SHA256
b8b8c13ef4144e69fc4bbfd729d9bfea22fc4baa21808e76815cd5b16768ed64
-
SHA512
71948be0cf77730a99fb6163c4878dbe659714cff6a7525929ce99de90060bc3b01002fd176712ec11d10629bb4735595c850c52cb3a7922cceb82065b05ca7d
-
SSDEEP
384:i8XQ2j+XkW1F5/jMRsy0FmLTtnIjYgRx52Tv7frYXtHFqU9sCaK6f9SFwe:i8Ud1n/jj3FmRSYckb7MtHPzaP7e
-
Cryptolocker family
-
Wannacry family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1