General

  • Target

    main.jar

  • Size

    639KB

  • Sample

    250301-29knvawtev

  • MD5

    9074ab4b94d39d3f3226fcbfd73f3688

  • SHA1

    16a9405665108bc33f687d99fcbec619b891aa72

  • SHA256

    5368591e13775ea45d841fc87584b30187f83230f712c99b4726c31b5f218942

  • SHA512

    34912a8c5a1d2064dd4f73cd4a600317964dc34680232b4d99793b8d36b49780bf2c4a137421a490f511e6d6f2a9d1d2e110e8ff5d0fc461f507713e043d6f89

  • SSDEEP

    12288:snbTQX/JN/6JJ4Vvo3ODga/PRz+NJUNmz8gKZ6Rbi3kuQ2VMSctDYi:sn3Qvv6r4pPDgaxKImzBQJku9VPctDYi

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Targets

    • Target

      main.jar

    • Size

      639KB

    • MD5

      9074ab4b94d39d3f3226fcbfd73f3688

    • SHA1

      16a9405665108bc33f687d99fcbec619b891aa72

    • SHA256

      5368591e13775ea45d841fc87584b30187f83230f712c99b4726c31b5f218942

    • SHA512

      34912a8c5a1d2064dd4f73cd4a600317964dc34680232b4d99793b8d36b49780bf2c4a137421a490f511e6d6f2a9d1d2e110e8ff5d0fc461f507713e043d6f89

    • SSDEEP

      12288:snbTQX/JN/6JJ4Vvo3ODga/PRz+NJUNmz8gKZ6Rbi3kuQ2VMSctDYi:sn3Qvv6r4pPDgaxKImzBQJku9VPctDYi

    • Detect Xworm Payload

    • Wannacry

      WannaCry is a ransomware cryptoworm.

    • Wannacry family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks