Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 07:49 UTC

General

  • Target

    2024-04-18_8f2fc5dfe5bad0015842dbe92da023df_wannacry.exe

  • Size

    128KB

  • MD5

    8f2fc5dfe5bad0015842dbe92da023df

  • SHA1

    67bc07193daa7d1682440657be9019f456a6ae6a

  • SHA256

    e32188f9dfa8b7d36a95edc45a56b39311fefd1df28af00a7e56b42e00557321

  • SHA512

    425de873f2cc95097ba7017b54a59905e2fc0af90a2d87f8e2ce04085350ae87e8223486ccaa6d50aba5e46a9085bda38b3099761d9f4d8869c6af4bad6b1b9c

  • SSDEEP

    3072:voTyX1r9maVrm4vCiipjEC7AXRTZfkTF8qmRHXHC56POTLe:Blr9maHajEQYRV4FkXHvG3

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detects command variations typically used by ransomware 2 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-18_8f2fc5dfe5bad0015842dbe92da023df_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-18_8f2fc5dfe5bad0015842dbe92da023df_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:528
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4592
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4036
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3848
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:1924
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1920
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3288
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1936
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1964
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:1620

    Network

    • flag-us
      DNS
      122.10.44.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      122.10.44.20.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      122.10.44.20.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      122.10.44.20.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      128KB

      MD5

      8f2fc5dfe5bad0015842dbe92da023df

      SHA1

      67bc07193daa7d1682440657be9019f456a6ae6a

      SHA256

      e32188f9dfa8b7d36a95edc45a56b39311fefd1df28af00a7e56b42e00557321

      SHA512

      425de873f2cc95097ba7017b54a59905e2fc0af90a2d87f8e2ce04085350ae87e8223486ccaa6d50aba5e46a9085bda38b3099761d9f4d8869c6af4bad6b1b9c

    • C:\Users\Admin\Documents\read_it.txt

      Filesize

      1KB

      MD5

      8c7d99ea76ba151e9ddf1c4ae4bdfa04

      SHA1

      20b97e322862e5b64fb018802b8029dec6882dae

      SHA256

      5331b4dd9deb58667f8359eca271dd0da984d77dd6060adaa27c6a9f825bd118

      SHA512

      bc25e540fc69525fbf8899d583b9e5642c4e4b8346adc24db59868ff4c1e47684981b37c6ec48a9a793a9194c12c407fb58346e552ad92403c948f33ba853eef

    • memory/2140-15-0x00007FF89AA20000-0x00007FF89B4E1000-memory.dmp

      Filesize

      10.8MB

    • memory/2140-431-0x00007FF89AA20000-0x00007FF89B4E1000-memory.dmp

      Filesize

      10.8MB

    • memory/4012-0-0x0000000000F00000-0x0000000000F26000-memory.dmp

      Filesize

      152KB

    • memory/4012-1-0x00007FF89AA20000-0x00007FF89B4E1000-memory.dmp

      Filesize

      10.8MB

    • memory/4012-14-0x00007FF89AA20000-0x00007FF89B4E1000-memory.dmp

      Filesize

      10.8MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.