Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 04:28

General

  • Target

    2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe

  • Size

    80KB

  • MD5

    cc08c839f91c6c4e2f91bc28de762eeb

  • SHA1

    f8cd5d7d3364eee8ab971006dcbc215039d7d252

  • SHA256

    00b93b6037537b7119361ca2a4a9641abc8d8f9fd182c6804859e12c2e391e88

  • SHA512

    983c1975056c17918e6e352d71bebc39e1fb0a6717ab06b8ea306ae8a955104beabaf0bc1dc3c71abf4dcf8f058353cea60a11371dcd7736277a111544c25e10

  • SSDEEP

    1536:TYlzqm0YbKgKVXbiQYRe5NCcbSoZ6va/ms4GS5a/O:TYl7t6NbhYIWcm+6va/6Gyp

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\SkynetData.txt

Ransom Note
------------------------ ALL YOUR FILES ARE ENCRYPTED ------------------------ ----> Оставайтесь сосредоточенными. <---- Все ваши файлы зашифрованы Ваш компьютер заражен вирусом-вымогателем. Ваши файлы зашифрованы, и вы не будете сможете расшифровать их без нашей помощи. Что я могу сделать, чтобы восстановить файлы? Вы можете купить наше программное обеспечение для дешифрования, это программное обеспечение позволит вам восстановить все ваши данные и удалить программы-вымогатели с вашего компьютера. Цена программного обеспечения составляет 130 долларов США (0,0027 BTC). может быть произведена только в биткойнах. Как оплатить, где я могу получить биткойны? Покупка биткойнов варьируется от страны к стране, лучше всего выполнить быстрый поиск в Google. Сами узнайте, как купить биткойн. Многие из наших клиентов отмечают, что эти сайты работают быстро и надежно: Коинмама — hxxps://www.coinmama.com Битпанда — hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 Для подтверждения покупки свяжитесь с администратором по электронной почте или в Telegram: Электронная почта — imhere.ru@protonmail.com ТЛГ - @payurransom ---------------------------------------------------------------------------------------------------------------------------------------- ----> Stay focused. <---- All your files have been encrypted Your computer has been infected with a ransomware virus. Your files have been encrypted and you won't be be able to decipher them without our help. What can I do to recover my files? You can buy our decryption software, this software will allow you to recover all your data and delete the ransomware from your computer. The price of the software is $130 (0.0027 BTC). Payment can only be made in Bitcoin. How to pay, where can I get Bitcoin? Buying Bitcoin varies from country to country, it's best to do a quick Google search. Yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 To confirm your purchase, please contact the administrator via email or Telegram: Email - imhere.ru@protonmail.com TLG - @payurransom ---------------------------------------------------------------------------------------------------------------------------------------- ----> Restez concentré. <---- Tous vos fichiers ont été cryptés Votre ordinateur a été infecté par un virus ransomware. Vos fichiers ont été cryptés et vous ne le serez pas pouvoir les décrypter sans notre aide. Que puis-je faire pour récupérer mes fichiers ? Vous pouvez acheter notre logiciel de décryptage, ce logiciel vous permettra de récupérer toutes vos données et de supprimer les ransomware depuis votre ordinateur. Le prix du logiciel est de 130 $ ( 0,0027 BTC). Le paiement peut être effectué uniquement en Bitcoin. Comment payer, où puis-je obtenir du Bitcoin ? L'achat de Bitcoin varie d'un pays à l'autre, il est préférable de faire une recherche rapide sur Google. Vous-même pour découvrir comment acheter du Bitcoin. Beaucoup de nos clients ont signalé que ces sites étaient rapides et fiables : Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 Pour confirmer votre achat, veuillez contacter l'administrateur via mail ou Telegram : Mail - imhere.ru@protonmail.com TLG - @payurransom
Emails

imhere.ru@protonmail.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detects command variations typically used by ransomware 3 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 3 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:2136
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2984
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2844
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2944
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:2932
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SkynetData.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1340
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2760
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1672
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1832
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
        PID:1732

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Defense Evasion

      Indicator Removal

      3
      T1070

      File Deletion

      3
      T1070.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      1
      T1552

      Credentials In Files

      1
      T1552.001

      Discovery

      System Information Discovery

      1
      T1082

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Impact

      Inhibit System Recovery

      4
      T1490

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\SkynetData.txt
        Filesize

        4KB

        MD5

        84fd99d7568f4fd57566b5f9313f21d0

        SHA1

        7b4b4cfa203b7710a9a0001d6c18ff98ddd58371

        SHA256

        936bec19a2a91faf09276b5527c2117a17dd6e1b02d934b5fa337fb3ae4aa3c6

        SHA512

        643f8e2a754b682ab7a1856e410814c3a96e695c8f053c34f77cbc39f0d4267fc271980a1de1b8d9c3e5c5fdb73af88d1f1436066bba78a51bb456e53f22f7a5

      • C:\Users\Admin\AppData\Roaming\svchost.exe
        Filesize

        80KB

        MD5

        cc08c839f91c6c4e2f91bc28de762eeb

        SHA1

        f8cd5d7d3364eee8ab971006dcbc215039d7d252

        SHA256

        00b93b6037537b7119361ca2a4a9641abc8d8f9fd182c6804859e12c2e391e88

        SHA512

        983c1975056c17918e6e352d71bebc39e1fb0a6717ab06b8ea306ae8a955104beabaf0bc1dc3c71abf4dcf8f058353cea60a11371dcd7736277a111544c25e10

      • C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Window Switcher.lnk
        Filesize

        1B

        MD5

        d1457b72c3fb323a2671125aef3eab5d

        SHA1

        5bab61eb53176449e25c2c82f172b82cb13ffb9d

        SHA256

        8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

        SHA512

        ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

      • memory/2036-10-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp
        Filesize

        9.9MB

      • memory/2036-8-0x0000000000B20000-0x0000000000B3A000-memory.dmp
        Filesize

        104KB

      • memory/2036-11-0x000000001B340000-0x000000001B3C0000-memory.dmp
        Filesize

        512KB

      • memory/2036-834-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp
        Filesize

        9.9MB

      • memory/2388-0-0x0000000000D60000-0x0000000000D7A000-memory.dmp
        Filesize

        104KB

      • memory/2388-1-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp
        Filesize

        9.9MB

      • memory/2388-2-0x000000001B0E0000-0x000000001B160000-memory.dmp
        Filesize

        512KB

      • memory/2388-9-0x000007FEF5AB0000-0x000007FEF649C000-memory.dmp
        Filesize

        9.9MB