General
-
Target
2024-04-03_d6ff005837ddd51800c690a4f3d2bb1c_wannacry
-
Size
101KB
-
Sample
240403-s9q17afc4s
-
MD5
d6ff005837ddd51800c690a4f3d2bb1c
-
SHA1
1e124e594c3dcaeb796870764c5058e7396b8979
-
SHA256
3ef443961db229c2dd9b90ef7db82eaac674f6da81e43e1d70cad06a0b3a8173
-
SHA512
8d68f941a0cfc8386f18b59e0123b0dc82a1673e4536f4e250c1be2c6fa732e2117183c1e60f860496e2d303ed97bdc12c8be9687d69a6e0d41a7c73bbf216cc
-
SSDEEP
3072:Uh0Qq9r+U/AW8OguUhP+CpiB+BGN4E/TsmSXx:Uh0Qq9Xh8OgRmCpiYQe
Behavioral task
behavioral1
Sample
2024-04-03_d6ff005837ddd51800c690a4f3d2bb1c_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-03_d6ff005837ddd51800c690a4f3d2bb1c_wannacry.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\read_it.txt
https://tox.chat/download.html
Targets
-
-
Target
2024-04-03_d6ff005837ddd51800c690a4f3d2bb1c_wannacry
-
Size
101KB
-
MD5
d6ff005837ddd51800c690a4f3d2bb1c
-
SHA1
1e124e594c3dcaeb796870764c5058e7396b8979
-
SHA256
3ef443961db229c2dd9b90ef7db82eaac674f6da81e43e1d70cad06a0b3a8173
-
SHA512
8d68f941a0cfc8386f18b59e0123b0dc82a1673e4536f4e250c1be2c6fa732e2117183c1e60f860496e2d303ed97bdc12c8be9687d69a6e0d41a7c73bbf216cc
-
SSDEEP
3072:Uh0Qq9r+U/AW8OguUhP+CpiB+BGN4E/TsmSXx:Uh0Qq9Xh8OgRmCpiYQe
Score10/10-
Chaos Ransomware
-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-