General
-
Target
new 1.txt
-
Size
16B
-
Sample
250223-kgxdha1mdn
-
MD5
17389fd42352d9124e9eb867d4f6f2af
-
SHA1
d405df9351cf9d5775e4a63766a83f6403f17282
-
SHA256
e7c8517568098e960be40ec88334cc28b58faab1a6c51672fdc371adf75b9e52
-
SHA512
4ce7a2391269a1b4d6c6be20c79dc20bbfb172c635250c73110155bd5e52e1e837bfecfd6c45a5c209c4a538d44524481015ae18d15622ed08e5920905ebf778
Static task
static1
Behavioral task
behavioral1
Sample
new 1.txt
Resource
win10v2004-20250217-en
Malware Config
Extracted
C:\Users\Admin\Downloads\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Targets
-
-
Target
new 1.txt
-
Size
16B
-
MD5
17389fd42352d9124e9eb867d4f6f2af
-
SHA1
d405df9351cf9d5775e4a63766a83f6403f17282
-
SHA256
e7c8517568098e960be40ec88334cc28b58faab1a6c51672fdc371adf75b9e52
-
SHA512
4ce7a2391269a1b4d6c6be20c79dc20bbfb172c635250c73110155bd5e52e1e837bfecfd6c45a5c209c4a538d44524481015ae18d15622ed08e5920905ebf778
-
Wannacry family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Modifies file permissions
-
Adds Run key to start application
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1