Analysis

  • max time kernel
    146s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    14-07-2020 07:32

General

  • Target

    test.vbs

  • Size

    589B

  • MD5

    94d9611bf2c6e0caa430b1b0b808da1e

  • SHA1

    723de46bdda58dd345b0c0bfd8bdbc33ea1931ec

  • SHA256

    8cf91cb3c0524feabe3b9502aa36ec58003e9e0db849901948cd335caf0e4f66

  • SHA512

    6baddf54c364c1c39bccd4f3e78f2b97f62297382c46642f6fc921fb2bc950e3ee44c6f94b5447c13faa028d9bc706ee9784582188e7a07fd3805de836b63e8e

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\@Please_Read_Me@.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@WanaDecryptor@.exe". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Signatures

  • Modifies service 2 TTPs 4 IoCs
  • Executes dropped EXE 17 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of WriteProcessMemory 81 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Views/modifies file attributes 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies registry key 1 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 53 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Blacklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\test.vbs"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Blacklisted process makes network request
    • Deletes itself
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\important.exe
      "C:\Users\Admin\AppData\Local\Temp\important.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      • Sets desktop wallpaper using registry
      PID:640
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h .
        3⤵
        • Views/modifies file attributes
        PID:864
      • C:\Windows\SysWOW64\icacls.exe
        icacls . /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        PID:916
      • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
        taskdl.exe
        3⤵
        • Executes dropped EXE
        PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 230491594719096.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\SysWOW64\cscript.exe
          cscript.exe //nologo m.vbs
          4⤵
            PID:2596
        • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          @WanaDecryptor@.exe co
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          • Suspicious use of SetWindowsHookEx
          PID:1148
          • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exe
            TaskData\Tor\taskhsvc.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            PID:2132
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c start /b @WanaDecryptor@.exe vs
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
            @WanaDecryptor@.exe vs
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            • Suspicious use of SetWindowsHookEx
            PID:1732
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1036
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                6⤵
                • Interacts with shadow copies
                PID:4020
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3888
        • C:\Users\Admin\AppData\Local\Temp\taskse.exe
          taskse.exe C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3668
        • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          @WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Sets desktop wallpaper using registry
          PID:3556
        • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
          taskdl.exe
          3⤵
          • Executes dropped EXE
          PID:1448
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "biiywaghgcpcp303" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3060
          • C:\Windows\SysWOW64\reg.exe
            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "biiywaghgcpcp303" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f
            4⤵
            • Modifies registry key
            • Adds Run entry to start application
            PID:1740
        • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
          taskdl.exe
          3⤵
          • Executes dropped EXE
          PID:3608
        • C:\Users\Admin\AppData\Local\Temp\taskse.exe
          taskse.exe C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3940
        • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          @WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1820
        • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
          taskdl.exe
          3⤵
          • Executes dropped EXE
          PID:2088
        • C:\Users\Admin\AppData\Local\Temp\taskse.exe
          taskse.exe C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3812
        • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          @WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3516
        • C:\Users\Admin\AppData\Local\Temp\taskse.exe
          taskse.exe C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1668
        • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
          @WanaDecryptor@.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3088
        • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
          taskdl.exe
          3⤵
          • Executes dropped EXE
          PID:816
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Modifies service
      • Suspicious use of AdjustPrivilegeToken
      PID:2768

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Hidden Files and Directories

    1
    T1158

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    4
    T1112

    File Deletion

    2
    T1107

    File Permissions Modification

    1
    T1222

    Hidden Files and Directories

    1
    T1158

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\00000000.res
    • C:\Users\Admin\AppData\Local\Temp\1.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\10.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\11.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\12.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\13.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\14.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\15.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\16.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\17.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\18.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\19.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\2.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\20.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\21.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\22.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\23.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\230491594719096.bat
    • C:\Users\Admin\AppData\Local\Temp\24.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\25.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\26.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\27.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\28.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\29.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\3.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\30.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\31.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\32.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\33.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\34.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\35.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\4.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\5.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\6.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\7.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\8.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\9.WNCRYT
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe
    • C:\Users\Admin\AppData\Local\Temp\@WanaDecryptor@.exe.lnk
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\LIBEAY32.dll
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\SSLEAY32.dll
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\libevent-2-0-5.dll
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\libgcc_s_sjlj-1.dll
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\libssp-0.dll
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exe
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exe
    • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\zlib1.dll
    • C:\Users\Admin\AppData\Local\Temp\b.wnry
    • C:\Users\Admin\AppData\Local\Temp\c.wnry
    • C:\Users\Admin\AppData\Local\Temp\c.wnry
    • C:\Users\Admin\AppData\Local\Temp\important.exe
    • C:\Users\Admin\AppData\Local\Temp\important.exe
    • C:\Users\Admin\AppData\Local\Temp\m.vbs
    • C:\Users\Admin\AppData\Local\Temp\msg\m_bulgarian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_chinese (simplified).wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_chinese (traditional).wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_croatian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_czech.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_danish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_dutch.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_english.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_filipino.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_finnish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_french.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_german.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_greek.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_indonesian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_italian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_japanese.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_korean.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_latvian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_norwegian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_polish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_portuguese.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_romanian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_russian.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_slovak.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_spanish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_swedish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_turkish.wnry
    • C:\Users\Admin\AppData\Local\Temp\msg\m_vietnamese.wnry
    • C:\Users\Admin\AppData\Local\Temp\r.wnry
    • C:\Users\Admin\AppData\Local\Temp\s.wnry
    • C:\Users\Admin\AppData\Local\Temp\t.wnry
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    • C:\Users\Admin\AppData\Local\Temp\u.wnry
    • C:\Users\Admin\Desktop\@WanaDecryptor@.bmp
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libeay32.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libeay32.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libevent-2-0-5.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libgcc_s_sjlj-1.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libgcc_s_sjlj-1.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\libssp-0.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\ssleay32.dll
    • \Users\Admin\AppData\Local\Temp\TaskData\Tor\zlib1.dll
    • memory/640-46-0x0000000010000000-0x0000000010010000-memory.dmp
      Filesize

      64KB

    • memory/640-4-0x0000000000000000-mapping.dmp
    • memory/816-650-0x0000000000000000-mapping.dmp
    • memory/864-7-0x0000000000000000-mapping.dmp
    • memory/916-8-0x0000000000000000-mapping.dmp
    • memory/1036-595-0x0000000000000000-mapping.dmp
    • memory/1148-55-0x0000000000000000-mapping.dmp
    • memory/1204-56-0x0000000000000000-mapping.dmp
    • memory/1448-578-0x0000000000000000-mapping.dmp
    • memory/1668-646-0x0000000000000000-mapping.dmp
    • memory/1732-59-0x0000000000000000-mapping.dmp
    • memory/1732-58-0x0000000000000000-mapping.dmp
    • memory/1740-594-0x0000000000000000-mapping.dmp
    • memory/1820-601-0x0000000000000000-mapping.dmp
    • memory/2088-604-0x0000000000000000-mapping.dmp
    • memory/2088-47-0x0000000000000000-mapping.dmp
    • memory/2132-407-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-527-0x0000000003770000-0x0000000003771000-memory.dmp
      Filesize

      4KB

    • memory/2132-410-0x0000000003F70000-0x0000000003F71000-memory.dmp
      Filesize

      4KB

    • memory/2132-579-0x0000000003770000-0x0000000003771000-memory.dmp
      Filesize

      4KB

    • memory/2132-411-0x0000000003770000-0x0000000003771000-memory.dmp
      Filesize

      4KB

    • memory/2132-62-0x0000000000000000-mapping.dmp
    • memory/2132-243-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-79-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-244-0x0000000003960000-0x0000000003961000-memory.dmp
      Filesize

      4KB

    • memory/2132-80-0x0000000003960000-0x0000000003961000-memory.dmp
      Filesize

      4KB

    • memory/2132-245-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-316-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-81-0x0000000003160000-0x0000000003161000-memory.dmp
      Filesize

      4KB

    • memory/2132-409-0x0000000003770000-0x0000000003771000-memory.dmp
      Filesize

      4KB

    • memory/2448-49-0x0000000000000000-mapping.dmp
    • memory/2596-51-0x0000000000000000-mapping.dmp
    • memory/3060-580-0x0000000000000000-mapping.dmp
    • memory/3088-648-0x0000000000000000-mapping.dmp
    • memory/3516-626-0x0000000000000000-mapping.dmp
    • memory/3556-575-0x0000000000000000-mapping.dmp
    • memory/3608-598-0x0000000000000000-mapping.dmp
    • memory/3668-574-0x0000000000000000-mapping.dmp
    • memory/3812-612-0x0000000000000000-mapping.dmp
    • memory/3888-597-0x0000000000000000-mapping.dmp
    • memory/3940-600-0x0000000000000000-mapping.dmp
    • memory/4020-596-0x0000000000000000-mapping.dmp