Analysis

  • max time kernel
    152s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2024 19:27

General

  • Target

    2024-03-23_68a7df17272b831cfc66c1032c32facf_destroyer_wannacry.exe

  • Size

    90KB

  • MD5

    68a7df17272b831cfc66c1032c32facf

  • SHA1

    dea12fb894f88ed6c905ca56b424252909d91c24

  • SHA256

    4f08c19447c00c39129518e6694bd1780174912b39327f5468e8523a2e423e5d

  • SHA512

    d555da23a9b1fa25988afb6c530de2d15f6a3494603e43d220a35f1c605c2537287daf5a6876360fdec83e41ab5d876f6dbac06c25e896ac5902fc9b85f3ea25

  • SSDEEP

    384:j3MLWHn3kIUHHOppIUs4IJ4r91CzCCr19e4p/1BpfaFxpbyOHh0f:Pn3kIGOppIUsJ4r9i5rDe4zXaN

Malware Config

Extracted

Path

C:\Users\Admin\Documents\READ ME FOR AN EXPLAINETION.txt

Ransom Note
All of your files have been encrypted. Your computer was infected with a ransomware virus. Your files have been encrypted and you won't be able to decrypt them without our help. What can I do to get my files back? You can buy our special decryption software. This software will allow you to recover all of your data and remove the ransomware from your computer. The price for the software is $50. Payment can be made in Bitcoin (Bitcoin Address: bc1qakhl8eu20ely220fxm6d3tjsk2al64vrha4sxa), Ethereum (ETH Address: 0x22D2C1C38b3c26C9E403B34ea5aF42Af00e90d9f), Binance Coin (BNB Address: bnb17CqMQFeuB3NTzJ2X28tfRmWaPyPQgvoHV0205gfc6ykk), or through PayPal (Burner Account: [email protected]). You can make the payment directly by visiting this PayPal site: PayPal Payment Site. How do I pay, where do I get Bitcoin, Ethereum, Binance Coin, or PayPal? Purchasing Bitcoin, Ethereum, or Binance Coin varies from country to country, you are best advised to do a quick Google search yourself to find out how to buy Bitcoin, Ethereum, Binance Coin, or set up a PayPal account. These sites will help you to get fast and reliable Bitcoin, Ethereum, Binance Coin, or PayPal. Coinmama - https://www.coinmama.com Bitpanda - https://www.bitpanda.com If you will try to seek for help or advice we recommend not to. Why you ask? Because no other software can decrypt this ransomware, only us have the special key to unlock it. So getting other decrypters will be worthless. Don't even think about calling the cops; we will snitch about your pedo activity! You have exactly 12 hours from now to pay up or your PC will be locked for a very long time, approximately 125 Years! Have fun buddy. We monitor every move you make, 👁️‍🗨️ with 8 eyes on you, always one step ahead 👁️, lurking in your devices.
URLs

https://www.coinmama.com

https://www.bitpanda.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Detects command variations typically used by ransomware 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-23_68a7df17272b831cfc66c1032c32facf_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-23_68a7df17272b831cfc66c1032c32facf_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3676
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\READ ME FOR AN EXPLAINETION.txt
        3⤵
          PID:3128
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4180 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4800

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        90KB

        MD5

        68a7df17272b831cfc66c1032c32facf

        SHA1

        dea12fb894f88ed6c905ca56b424252909d91c24

        SHA256

        4f08c19447c00c39129518e6694bd1780174912b39327f5468e8523a2e423e5d

        SHA512

        d555da23a9b1fa25988afb6c530de2d15f6a3494603e43d220a35f1c605c2537287daf5a6876360fdec83e41ab5d876f6dbac06c25e896ac5902fc9b85f3ea25

      • C:\Users\Admin\Documents\READ ME FOR AN EXPLAINETION.txt

        Filesize

        1KB

        MD5

        43779c2e45e690a7725dec568068513e

        SHA1

        9e89a34b8d270788c4b690348563d83ac17436ea

        SHA256

        4593281a0ce90b519b799ac1d04af6643a0ba37b7cef27aad16ee9dead959545

        SHA512

        60aed98583262f3f44b845b73bdf13b5db19e8020a4dc28aa2196ff9762e2320c9260c0034768e29136a92200b1f8b6739e76fcdb905dfca03ea0a52ee326d58

      • memory/2980-15-0x00007FF970B80000-0x00007FF971641000-memory.dmp

        Filesize

        10.8MB

      • memory/2980-69-0x00007FF970B80000-0x00007FF971641000-memory.dmp

        Filesize

        10.8MB

      • memory/3676-0-0x00000000008E0000-0x00000000008FC000-memory.dmp

        Filesize

        112KB

      • memory/3676-1-0x00007FF970B80000-0x00007FF971641000-memory.dmp

        Filesize

        10.8MB

      • memory/3676-14-0x00007FF970B80000-0x00007FF971641000-memory.dmp

        Filesize

        10.8MB