Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2024 04:28

General

  • Target

    2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe

  • Size

    80KB

  • MD5

    cc08c839f91c6c4e2f91bc28de762eeb

  • SHA1

    f8cd5d7d3364eee8ab971006dcbc215039d7d252

  • SHA256

    00b93b6037537b7119361ca2a4a9641abc8d8f9fd182c6804859e12c2e391e88

  • SHA512

    983c1975056c17918e6e352d71bebc39e1fb0a6717ab06b8ea306ae8a955104beabaf0bc1dc3c71abf4dcf8f058353cea60a11371dcd7736277a111544c25e10

  • SSDEEP

    1536:TYlzqm0YbKgKVXbiQYRe5NCcbSoZ6va/ms4GS5a/O:TYl7t6NbhYIWcm+6va/6Gyp

Malware Config

Extracted

Path

C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\SkynetData.txt

Ransom Note
------------------------ ALL YOUR FILES ARE ENCRYPTED ------------------------ ----> Оставайтесь сосредоточенными. <---- Все ваши файлы зашифрованы Ваш компьютер заражен вирусом-вымогателем. Ваши файлы зашифрованы, и вы не будете сможете расшифровать их без нашей помощи. Что я могу сделать, чтобы восстановить файлы? Вы можете купить наше программное обеспечение для дешифрования, это программное обеспечение позволит вам восстановить все ваши данные и удалить программы-вымогатели с вашего компьютера. Цена программного обеспечения составляет 130 долларов США (0,0027 BTC). может быть произведена только в биткойнах. Как оплатить, где я могу получить биткойны? Покупка биткойнов варьируется от страны к стране, лучше всего выполнить быстрый поиск в Google. Сами узнайте, как купить биткойн. Многие из наших клиентов отмечают, что эти сайты работают быстро и надежно: Коинмама — hxxps://www.coinmama.com Битпанда — hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 Для подтверждения покупки свяжитесь с администратором по электронной почте или в Telegram: Электронная почта — imhere.ru@protonmail.com ТЛГ - @payurransom ---------------------------------------------------------------------------------------------------------------------------------------- ----> Stay focused. <---- All your files have been encrypted Your computer has been infected with a ransomware virus. Your files have been encrypted and you won't be be able to decipher them without our help. What can I do to recover my files? You can buy our decryption software, this software will allow you to recover all your data and delete the ransomware from your computer. The price of the software is $130 (0.0027 BTC). Payment can only be made in Bitcoin. How to pay, where can I get Bitcoin? Buying Bitcoin varies from country to country, it's best to do a quick Google search. Yourself to find out how to buy Bitcoin. Many of our customers have reported these sites to be fast and reliable: Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 To confirm your purchase, please contact the administrator via email or Telegram: Email - imhere.ru@protonmail.com TLG - @payurransom ---------------------------------------------------------------------------------------------------------------------------------------- ----> Restez concentré. <---- Tous vos fichiers ont été cryptés Votre ordinateur a été infecté par un virus ransomware. Vos fichiers ont été cryptés et vous ne le serez pas pouvoir les décrypter sans notre aide. Que puis-je faire pour récupérer mes fichiers ? Vous pouvez acheter notre logiciel de décryptage, ce logiciel vous permettra de récupérer toutes vos données et de supprimer les ransomware depuis votre ordinateur. Le prix du logiciel est de 130 $ ( 0,0027 BTC). Le paiement peut être effectué uniquement en Bitcoin. Comment payer, où puis-je obtenir du Bitcoin ? L'achat de Bitcoin varie d'un pays à l'autre, il est préférable de faire une recherche rapide sur Google. Vous-même pour découvrir comment acheter du Bitcoin. Beaucoup de nos clients ont signalé que ces sites étaient rapides et fiables : Coinmama - hxxps://www.coinmama.com Bitpanda - hxxps://www.bitpanda.com BTC : bc1qf48urryzyt3t8a4g5sdjkfy4qdkqdnq24q3xr5 ETH : 0x55069B5317529E07ccABAaA5AaE22a9bfa1C3E12 Pour confirmer votre achat, veuillez contacter l'administrateur via mail ou Telegram : Mail - imhere.ru@protonmail.com TLG - @payurransom
Emails

imhere.ru@protonmail.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detects command variations typically used by ransomware 2 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 2 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (526) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-02_cc08c839f91c6c4e2f91bc28de762eeb_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1316
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:3888
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3304
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3244
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2520
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:2004
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:4584
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SkynetData.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1588
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:772
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3496
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1516
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4136

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Indicator Removal

    3
    T1070

    File Deletion

    3
    T1070.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    3
    T1082

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    4
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\IconCache.db
      Filesize

      1B

      MD5

      d1457b72c3fb323a2671125aef3eab5d

      SHA1

      5bab61eb53176449e25c2c82f172b82cb13ffb9d

      SHA256

      8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

      SHA512

      ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

    • C:\Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      80KB

      MD5

      cc08c839f91c6c4e2f91bc28de762eeb

      SHA1

      f8cd5d7d3364eee8ab971006dcbc215039d7d252

      SHA256

      00b93b6037537b7119361ca2a4a9641abc8d8f9fd182c6804859e12c2e391e88

      SHA512

      983c1975056c17918e6e352d71bebc39e1fb0a6717ab06b8ea306ae8a955104beabaf0bc1dc3c71abf4dcf8f058353cea60a11371dcd7736277a111544c25e10

    • C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\SkynetData.txt
      Filesize

      4KB

      MD5

      84fd99d7568f4fd57566b5f9313f21d0

      SHA1

      7b4b4cfa203b7710a9a0001d6c18ff98ddd58371

      SHA256

      936bec19a2a91faf09276b5527c2117a17dd6e1b02d934b5fa337fb3ae4aa3c6

      SHA512

      643f8e2a754b682ab7a1856e410814c3a96e695c8f053c34f77cbc39f0d4267fc271980a1de1b8d9c3e5c5fdb73af88d1f1436066bba78a51bb456e53f22f7a5

    • memory/1548-0-0x00000169DB080000-0x00000169DB09A000-memory.dmp
      Filesize

      104KB

    • memory/1548-1-0x00007FFB81160000-0x00007FFB81C21000-memory.dmp
      Filesize

      10.8MB

    • memory/1548-2-0x00000169F5750000-0x00000169F5760000-memory.dmp
      Filesize

      64KB

    • memory/1548-15-0x00007FFB81160000-0x00007FFB81C21000-memory.dmp
      Filesize

      10.8MB

    • memory/3292-16-0x00007FFB81160000-0x00007FFB81C21000-memory.dmp
      Filesize

      10.8MB

    • memory/3292-1443-0x00007FFB81160000-0x00007FFB81C21000-memory.dmp
      Filesize

      10.8MB