Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 13:42
Behavioral task
behavioral1
Sample
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe
-
Size
22KB
-
MD5
af51c1a91ec1249730d7b22979cc7c42
-
SHA1
5285d86451c719a0b0c0eb833ac227772488436d
-
SHA256
4710fb0bd1a6beb6f5b9cbb88a3141fbaffc54341f146570a7aac42df2938588
-
SHA512
b2fcd6dcefb8b672b5c9d27fcd08f0858fc46e58b2f73511d4aaa2fea63d68fb3ac0b5e8a0ea6375227fc5a26a8dfc48b116225397aea6b7b9165a348c3a55e0
-
SSDEEP
384:U3Mg/bqo2pOv0tpDnqp+Ao4+X0Z/zJHr91C8OWhneK:qqo2EDp+J4+kRVHr9hLJeK
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-0-0x00000000001F0000-0x00000000001FC000-memory.dmp family_chaos C:\Users\Admin\AppData\Roaming\svchost.exe family_chaos behavioral1/memory/2204-7-0x0000000000B50000-0x0000000000B5C000-memory.dmp family_chaos -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-0-0x00000000001F0000-0x00000000001FC000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware C:\Users\Admin\AppData\Roaming\svchost.exe INDICATOR_SUSPICIOUS_GENRansomware behavioral1/memory/2204-7-0x0000000000B50000-0x0000000000B5C000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1740 bcdedit.exe 1676 bcdedit.exe -
Processes:
wbadmin.exepid process 2244 wbadmin.exe -
Drops startup file 3 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2204 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Public\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Public\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini svchost.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Documents\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini svchost.exe File opened for modification C:\Users\Public\Pictures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Searches\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Videos\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini svchost.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Links\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini svchost.exe File opened for modification C:\Users\Public\Music\desktop.ini svchost.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini svchost.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2212 vssadmin.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 2340 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
svchost.exepid process 2204 svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exesvchost.exepid process 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe 2204 svchost.exe 2204 svchost.exe 2204 svchost.exe 2204 svchost.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
Processes:
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exesvchost.exevssvc.exeWMIC.exewbengine.exedescription pid process Token: SeDebugPrivilege 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe Token: SeDebugPrivilege 2204 svchost.exe Token: SeBackupPrivilege 2912 vssvc.exe Token: SeRestorePrivilege 2912 vssvc.exe Token: SeAuditPrivilege 2912 vssvc.exe Token: SeIncreaseQuotaPrivilege 948 WMIC.exe Token: SeSecurityPrivilege 948 WMIC.exe Token: SeTakeOwnershipPrivilege 948 WMIC.exe Token: SeLoadDriverPrivilege 948 WMIC.exe Token: SeSystemProfilePrivilege 948 WMIC.exe Token: SeSystemtimePrivilege 948 WMIC.exe Token: SeProfSingleProcessPrivilege 948 WMIC.exe Token: SeIncBasePriorityPrivilege 948 WMIC.exe Token: SeCreatePagefilePrivilege 948 WMIC.exe Token: SeBackupPrivilege 948 WMIC.exe Token: SeRestorePrivilege 948 WMIC.exe Token: SeShutdownPrivilege 948 WMIC.exe Token: SeDebugPrivilege 948 WMIC.exe Token: SeSystemEnvironmentPrivilege 948 WMIC.exe Token: SeRemoteShutdownPrivilege 948 WMIC.exe Token: SeUndockPrivilege 948 WMIC.exe Token: SeManageVolumePrivilege 948 WMIC.exe Token: 33 948 WMIC.exe Token: 34 948 WMIC.exe Token: 35 948 WMIC.exe Token: SeIncreaseQuotaPrivilege 948 WMIC.exe Token: SeSecurityPrivilege 948 WMIC.exe Token: SeTakeOwnershipPrivilege 948 WMIC.exe Token: SeLoadDriverPrivilege 948 WMIC.exe Token: SeSystemProfilePrivilege 948 WMIC.exe Token: SeSystemtimePrivilege 948 WMIC.exe Token: SeProfSingleProcessPrivilege 948 WMIC.exe Token: SeIncBasePriorityPrivilege 948 WMIC.exe Token: SeCreatePagefilePrivilege 948 WMIC.exe Token: SeBackupPrivilege 948 WMIC.exe Token: SeRestorePrivilege 948 WMIC.exe Token: SeShutdownPrivilege 948 WMIC.exe Token: SeDebugPrivilege 948 WMIC.exe Token: SeSystemEnvironmentPrivilege 948 WMIC.exe Token: SeRemoteShutdownPrivilege 948 WMIC.exe Token: SeUndockPrivilege 948 WMIC.exe Token: SeManageVolumePrivilege 948 WMIC.exe Token: 33 948 WMIC.exe Token: 34 948 WMIC.exe Token: 35 948 WMIC.exe Token: SeBackupPrivilege 2232 wbengine.exe Token: SeRestorePrivilege 2232 wbengine.exe Token: SeSecurityPrivilege 2232 wbengine.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exesvchost.execmd.execmd.execmd.exedescription pid process target process PID 2820 wrote to memory of 2204 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe svchost.exe PID 2820 wrote to memory of 2204 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe svchost.exe PID 2820 wrote to memory of 2204 2820 2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe svchost.exe PID 2204 wrote to memory of 2496 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 2496 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 2496 2204 svchost.exe cmd.exe PID 2496 wrote to memory of 2212 2496 cmd.exe vssadmin.exe PID 2496 wrote to memory of 2212 2496 cmd.exe vssadmin.exe PID 2496 wrote to memory of 2212 2496 cmd.exe vssadmin.exe PID 2496 wrote to memory of 948 2496 cmd.exe WMIC.exe PID 2496 wrote to memory of 948 2496 cmd.exe WMIC.exe PID 2496 wrote to memory of 948 2496 cmd.exe WMIC.exe PID 2204 wrote to memory of 1584 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 1584 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 1584 2204 svchost.exe cmd.exe PID 1584 wrote to memory of 1740 1584 cmd.exe bcdedit.exe PID 1584 wrote to memory of 1740 1584 cmd.exe bcdedit.exe PID 1584 wrote to memory of 1740 1584 cmd.exe bcdedit.exe PID 1584 wrote to memory of 1676 1584 cmd.exe bcdedit.exe PID 1584 wrote to memory of 1676 1584 cmd.exe bcdedit.exe PID 1584 wrote to memory of 1676 1584 cmd.exe bcdedit.exe PID 2204 wrote to memory of 2900 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 2900 2204 svchost.exe cmd.exe PID 2204 wrote to memory of 2900 2204 svchost.exe cmd.exe PID 2900 wrote to memory of 2244 2900 cmd.exe wbadmin.exe PID 2900 wrote to memory of 2244 2900 cmd.exe wbadmin.exe PID 2900 wrote to memory of 2244 2900 cmd.exe wbadmin.exe PID 2204 wrote to memory of 2340 2204 svchost.exe NOTEPAD.EXE PID 2204 wrote to memory of 2340 2204 svchost.exe NOTEPAD.EXE PID 2204 wrote to memory of 2340 2204 svchost.exe NOTEPAD.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-29_af51c1a91ec1249730d7b22979cc7c42_chaos_destroyer_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
-
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
22KB
MD5af51c1a91ec1249730d7b22979cc7c42
SHA15285d86451c719a0b0c0eb833ac227772488436d
SHA2564710fb0bd1a6beb6f5b9cbb88a3141fbaffc54341f146570a7aac42df2938588
SHA512b2fcd6dcefb8b672b5c9d27fcd08f0858fc46e58b2f73511d4aaa2fea63d68fb3ac0b5e8a0ea6375227fc5a26a8dfc48b116225397aea6b7b9165a348c3a55e0
-
C:\Users\Admin\Documents\read_it.txtFilesize
462B
MD59ef56b0438e82e07aa14fb9481d10b18
SHA1b4d069b4737d9f32d07618d83650f7c1ed3bf6eb
SHA256ae7ff3ea3c8870144b97cde602f5e84f8a365939cf127fafa38a5309f29b69d3
SHA512a7f14c7f8b01ef7c21e2350e9b9efdcbb8d533197b63d7bc50d4c75a2190a2fc5633698a532ed07a186333097dd08991852721051d255d1bf2cfc9356cdf523d
-
memory/2204-7-0x0000000000B50000-0x0000000000B5C000-memory.dmpFilesize
48KB
-
memory/2204-9-0x000007FEF5F70000-0x000007FEF695C000-memory.dmpFilesize
9.9MB
-
memory/2204-11-0x000000001AC70000-0x000000001ACF0000-memory.dmpFilesize
512KB
-
memory/2204-440-0x000007FEF5F70000-0x000007FEF695C000-memory.dmpFilesize
9.9MB
-
memory/2204-441-0x000000001AC70000-0x000000001ACF0000-memory.dmpFilesize
512KB
-
memory/2820-0-0x00000000001F0000-0x00000000001FC000-memory.dmpFilesize
48KB
-
memory/2820-1-0x000007FEF5F70000-0x000007FEF695C000-memory.dmpFilesize
9.9MB
-
memory/2820-8-0x000007FEF5F70000-0x000007FEF695C000-memory.dmpFilesize
9.9MB