General

  • Target

    ORBIT FREE.dll

  • Size

    11.3MB

  • Sample

    250201-txrydsslgr

  • MD5

    8e9249a28d777834203338824f457369

  • SHA1

    f4339523740d4b9a79faa0dee9a223f6d38576a2

  • SHA256

    ceb587cb2ca760a6894fe5d052ad392a73b25ba87f6cce3dfb1be4c811c4842b

  • SHA512

    31befef3c9f37d920e95abb18622bd61c4802506155ef4a9c530fe6e14007f8d7a31287ec9b373217b38977c382ed8da8407b0c823226a14bc0fbc5387e1b368

  • SSDEEP

    98304:2JwySrhI5hxATfn0HgcXgFjw9tghPrQ6Aw7:SwySrKRArn6XaskR7z

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Extracted

Path

C:\Users\Admin\Downloads\r.wry

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send %s to this bitcoin address: %s Next, please find the decrypt software on your desktop, an executable file named "%s". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) %s rar password: wcry123 Run and follow the instructions!

Targets

    • Target

      ORBIT FREE.dll

    • Size

      11.3MB

    • MD5

      8e9249a28d777834203338824f457369

    • SHA1

      f4339523740d4b9a79faa0dee9a223f6d38576a2

    • SHA256

      ceb587cb2ca760a6894fe5d052ad392a73b25ba87f6cce3dfb1be4c811c4842b

    • SHA512

      31befef3c9f37d920e95abb18622bd61c4802506155ef4a9c530fe6e14007f8d7a31287ec9b373217b38977c382ed8da8407b0c823226a14bc0fbc5387e1b368

    • SSDEEP

      98304:2JwySrhI5hxATfn0HgcXgFjw9tghPrQ6Aw7:SwySrKRArn6XaskR7z

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Uses Session Manager for persistence

      Creates Session Manager registry key to run executable early in system boot.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: Clear Persistence

      remove IFEO.

    • Legitimate hosting services abused for malware hosting/C2

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks