Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2024 06:26

General

  • Target

    2024-02-10_7051dcbe9a0837a312b09a5ae3b42430_destroyer_wannacry.exe

  • Size

    84KB

  • MD5

    7051dcbe9a0837a312b09a5ae3b42430

  • SHA1

    3553ff8725a57929e438228bf141b695c13cecb4

  • SHA256

    ce750c7054359e9e88556d48f7eea341374b74f494caed48251185b54c9ed644

  • SHA512

    2e82160bff1fbdd6f6a9f0210dfaf831650fdefdf8e3bb70c3c2717122b107ef3610c5c5f55908843df7ba3bd3bbefc40b9d1dda07877083cbd2ab8b090a276c

  • SSDEEP

    1536:Zo2eMtPr9b/u+hCnbKeg7hISAv8Iz/xYnPCiPlNE927Zk5L+:Zo5MtPr9b/u+yoza/xYPCSc27ZIL+

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Renames multiple (199) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-10_7051dcbe9a0837a312b09a5ae3b42430_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-10_7051dcbe9a0837a312b09a5ae3b42430_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    84KB

    MD5

    7051dcbe9a0837a312b09a5ae3b42430

    SHA1

    3553ff8725a57929e438228bf141b695c13cecb4

    SHA256

    ce750c7054359e9e88556d48f7eea341374b74f494caed48251185b54c9ed644

    SHA512

    2e82160bff1fbdd6f6a9f0210dfaf831650fdefdf8e3bb70c3c2717122b107ef3610c5c5f55908843df7ba3bd3bbefc40b9d1dda07877083cbd2ab8b090a276c

  • C:\Users\Admin\Documents\read_it.txt

    Filesize

    140B

    MD5

    ee20a3aaf13c2d8805ede471f1f3ed3c

    SHA1

    bac14bc149af77885de0f6997fe3f3bf3f9686ad

    SHA256

    b9afbd14a42e996a8de6eba45b8a6df17a958f1b269913eab89484f62d373919

    SHA512

    8dea66d1bb1ee359b61fa32e3a45a1d66cf8987fdbec4218ef258b58aaaf9475e77bff2d40f9f28f4a75f321de6f86de6f42ab3cd7afee4e213ffbe3ae03f714

  • memory/1936-0-0x0000000000AB0000-0x0000000000ACC000-memory.dmp

    Filesize

    112KB

  • memory/1936-1-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

    Filesize

    9.9MB

  • memory/1936-8-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3068-7-0x0000000000360000-0x000000000037C000-memory.dmp

    Filesize

    112KB

  • memory/3068-9-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3068-11-0x000000001AE00000-0x000000001AE80000-memory.dmp

    Filesize

    512KB

  • memory/3068-463-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3068-464-0x000000001AE00000-0x000000001AE80000-memory.dmp

    Filesize

    512KB