General
-
Target
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry
-
Size
1.6MB
-
Sample
250328-298qnsvqw9
-
MD5
4c0e5c4aa3eb66907cf32b7bd869dd8f
-
SHA1
2f97ad58991c727a897f4613e00d6b24a3300a85
-
SHA256
31aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
-
SHA512
56ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
SSDEEP
24576:T1I8mdFc9nPV3EouDm6BkNEnzC5CW78UV:OFc3C37zCyG
Behavioral task
behavioral1
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\ProgramData\Adobe\Updater6\read_it.txt
Targets
-
-
Target
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry
-
Size
1.6MB
-
MD5
4c0e5c4aa3eb66907cf32b7bd869dd8f
-
SHA1
2f97ad58991c727a897f4613e00d6b24a3300a85
-
SHA256
31aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
-
SHA512
56ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
SSDEEP
24576:T1I8mdFc9nPV3EouDm6BkNEnzC5CW78UV:OFc3C37zCyG
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1