Analysis
-
max time kernel
29s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27/05/2023, 02:34
Behavioral task
behavioral1
Sample
2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe
Resource
win10v2004-20230221-en
General
-
Target
2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe
-
Size
22KB
-
MD5
544f4dd222b91ea9febe67fc264512e1
-
SHA1
138d3cab4d5a39c95d1c711f4cf6a5f7b5abd533
-
SHA256
6b65f08038aca6ffc04a1aa0a260c16d744e18d42c69884b1f34db57fa839318
-
SHA512
eedc437982c73acdca4e661eb3fe804223d3f5fde894a935973afa8bf86f313f80e028699edbb4ddfcda7df069326e928dd42112feda1c84e0abc3a9fe00d3b8
-
SSDEEP
384:c3Mg/bqo2xxDIZEpGOjuwzU/Jnr91CZxkEMwe1:iqo2TD5p7jKxnr90Re1
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1772-54-0x0000000001060000-0x000000000106C000-memory.dmp family_chaos behavioral1/files/0x000400000000b46e-58.dat family_chaos behavioral1/files/0x000400000000b46e-59.dat family_chaos behavioral1/memory/1564-60-0x0000000000DC0000-0x0000000000DCC000-memory.dmp family_chaos -
Renames multiple (197) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\SplitTest.png => C:\Users\Admin\Pictures\SplitTest.png.encrypted svchost.exe File renamed C:\Users\Admin\Pictures\UninstallPing.tif => C:\Users\Admin\Pictures\UninstallPing.tif.encrypted svchost.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Unlock_my _files.txt svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 33 IoCs
description ioc Process File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1564 svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1772 2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe 1564 svchost.exe 1564 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1772 2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe Token: SeDebugPrivilege 1564 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1564 1772 2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe 28 PID 1772 wrote to memory of 1564 1772 2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe 28 PID 1772 wrote to memory of 1564 1772 2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe 28 PID 1564 wrote to memory of 1876 1564 svchost.exe 30 PID 1564 wrote to memory of 1876 1564 svchost.exe 30 PID 1564 wrote to memory of 1876 1564 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2023-05-25_544f4dd222b91ea9febe67fc264512e1_destroyer_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Modifies extensions of user files
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Unlock_my _files.txt3⤵PID:1876
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406B
MD5c6038adaa663b784401790743085bde6
SHA153804359eb625eb6f23a49beb3e1fbe7ae70333a
SHA25682958ca8eee775895536280411b49234ebd5f15ac51b69907deceb20a13c3f38
SHA512cd660f1805b4a1a73f1ac6869e8b588e8a633e39551b243dfc2f68d4d1d1de38d6ce02217dd0c9231bed4f85737dd24f3762cae95cb0bfdbe7df73d923f907b1
-
Filesize
22KB
MD5544f4dd222b91ea9febe67fc264512e1
SHA1138d3cab4d5a39c95d1c711f4cf6a5f7b5abd533
SHA2566b65f08038aca6ffc04a1aa0a260c16d744e18d42c69884b1f34db57fa839318
SHA512eedc437982c73acdca4e661eb3fe804223d3f5fde894a935973afa8bf86f313f80e028699edbb4ddfcda7df069326e928dd42112feda1c84e0abc3a9fe00d3b8
-
Filesize
22KB
MD5544f4dd222b91ea9febe67fc264512e1
SHA1138d3cab4d5a39c95d1c711f4cf6a5f7b5abd533
SHA2566b65f08038aca6ffc04a1aa0a260c16d744e18d42c69884b1f34db57fa839318
SHA512eedc437982c73acdca4e661eb3fe804223d3f5fde894a935973afa8bf86f313f80e028699edbb4ddfcda7df069326e928dd42112feda1c84e0abc3a9fe00d3b8
-
Filesize
406B
MD5c6038adaa663b784401790743085bde6
SHA153804359eb625eb6f23a49beb3e1fbe7ae70333a
SHA25682958ca8eee775895536280411b49234ebd5f15ac51b69907deceb20a13c3f38
SHA512cd660f1805b4a1a73f1ac6869e8b588e8a633e39551b243dfc2f68d4d1d1de38d6ce02217dd0c9231bed4f85737dd24f3762cae95cb0bfdbe7df73d923f907b1