Resubmissions

17-02-2024 03:17

240217-ds1rqsac8t 10

17-02-2024 02:41

240217-c6pqysae92 10

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17-02-2024 02:41

General

  • Target

    2024-02-17_c09a3f2e029a40c3b355e4deaf789f86_destroyer_wannacry.exe

  • Size

    21KB

  • MD5

    c09a3f2e029a40c3b355e4deaf789f86

  • SHA1

    9101fe519c536ba5cc5bfe4def3392aec33b78b4

  • SHA256

    fb992b061173e96c9b3290fe7370fe937b0f1a6326a0070423caa1ea82b910d5

  • SHA512

    d882d9d87112d0fbe81bcd7038734a27d508055ab05e0c426ffd2a70d267d13f057afec2736d946c8a99690189e6fc650eca47a0b21676c25a786946af212018

  • SSDEEP

    384:e3Mg/bqo2mRnG38p+SuqwFWLJRr91CHXPRe9:cqo2Ap+DT89Rr945e9

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-17_c09a3f2e029a40c3b355e4deaf789f86_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-17_c09a3f2e029a40c3b355e4deaf789f86_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    21KB

    MD5

    c09a3f2e029a40c3b355e4deaf789f86

    SHA1

    9101fe519c536ba5cc5bfe4def3392aec33b78b4

    SHA256

    fb992b061173e96c9b3290fe7370fe937b0f1a6326a0070423caa1ea82b910d5

    SHA512

    d882d9d87112d0fbe81bcd7038734a27d508055ab05e0c426ffd2a70d267d13f057afec2736d946c8a99690189e6fc650eca47a0b21676c25a786946af212018

  • C:\Users\Admin\Documents\read_it.txt

    Filesize

    5B

    MD5

    584da0a485f209242059e6de66aac904

    SHA1

    0250a7b095bc6a969adbe25de14d23c4224d37c3

    SHA256

    01f9bf4bb49ac52d7d7a7d61f79e51c2cba94c5f75e034143ea614f0d87b929c

    SHA512

    c44088e8f19a177b9f47f0c8f0e1c86083a0b9dbc61f4fb4faa104be1b978ac75d037e6aa0cb4de577cea01b118f3d202659b8501948d7a539f2e13d6d0fe4f4

  • memory/2524-9-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2524-8-0x0000000000D20000-0x0000000000D2C000-memory.dmp

    Filesize

    48KB

  • memory/2524-11-0x000000001AF40000-0x000000001AFC0000-memory.dmp

    Filesize

    512KB

  • memory/2524-503-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2524-504-0x000000001AF40000-0x000000001AFC0000-memory.dmp

    Filesize

    512KB

  • memory/3060-0-0x00000000001A0000-0x00000000001AC000-memory.dmp

    Filesize

    48KB

  • memory/3060-1-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

    Filesize

    9.9MB

  • memory/3060-7-0x000007FEF5AD0000-0x000007FEF64BC000-memory.dmp

    Filesize

    9.9MB