Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 04:48
Behavioral task
behavioral1
Sample
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe
-
Size
86KB
-
MD5
8f127c103c5c42664521a9be296a587a
-
SHA1
c6749246a83f5a63b9e1a4516e6810fc7ecd28e0
-
SHA256
cac286e52563a7892d233c1497496594fe50aa8fb4ad73a9def0eb8c351b742d
-
SHA512
ff895ef8a9fa1d7637fb4f7b3a31b8537f5c0238a38f1fc710650e38a12a6a769f303bf89a48cb82d0a60a9e31c32aed1bd568f18cf0c090c8d936d1b5dd5ff2
-
SSDEEP
1536:fo2scar9wKkrJOzzzzzzzzzzzzzfmzzzzzzzzzzl3C8GeGlzzzzzzzNlzzzzzzzy:foPcar9wx9CkGrdmQklQVrU
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4748-1-0x0000000000360000-0x000000000037C000-memory.dmp family_chaos C:\Users\Admin\AppData\Roaming\svchost.exe family_chaos -
Detects command variations typically used by ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4748-1-0x0000000000360000-0x000000000037C000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware C:\Users\Admin\AppData\Roaming\svchost.exe INDICATOR_SUSPICIOUS_GENRansomware -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation svchost.exe -
Drops startup file 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 4224 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpgxr9uk9.jpg" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000_Classes\Local Settings svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4288 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
svchost.exepid process 4224 svchost.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exesvchost.exepid process 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe 4224 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exesvchost.exedescription pid process Token: SeDebugPrivilege 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe Token: SeDebugPrivilege 4224 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exesvchost.exedescription pid process target process PID 4748 wrote to memory of 4224 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe svchost.exe PID 4748 wrote to memory of 4224 4748 2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe svchost.exe PID 4224 wrote to memory of 4288 4224 svchost.exe NOTEPAD.EXE PID 4224 wrote to memory of 4288 4224 svchost.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-04_8f127c103c5c42664521a9be296a587a_destroyer_wannacry.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\read_it.txtFilesize
94B
MD5df43b8b8d34e947ec116088fa465702a
SHA1c145482bf4a7eff15f30617e93b1b4831be1fb30
SHA2564c3808e41dae9349f472e6cbc8e41c17d12a7b6727cfca9bc941ff0d0b5b6982
SHA512ac527673757e14ab47ae241e752163915cadbd43983aff56b5da6f38fd29b7940e2906c216f914b2bf541945ebaa0262271d8a927cf96d6bd075e00b936901dc
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
86KB
MD58f127c103c5c42664521a9be296a587a
SHA1c6749246a83f5a63b9e1a4516e6810fc7ecd28e0
SHA256cac286e52563a7892d233c1497496594fe50aa8fb4ad73a9def0eb8c351b742d
SHA512ff895ef8a9fa1d7637fb4f7b3a31b8537f5c0238a38f1fc710650e38a12a6a769f303bf89a48cb82d0a60a9e31c32aed1bd568f18cf0c090c8d936d1b5dd5ff2
-
memory/4224-14-0x00007FF825A10000-0x00007FF8264D1000-memory.dmpFilesize
10.8MB
-
memory/4224-27-0x00007FF825A10000-0x00007FF8264D1000-memory.dmpFilesize
10.8MB
-
memory/4748-0-0x00007FF825A13000-0x00007FF825A15000-memory.dmpFilesize
8KB
-
memory/4748-1-0x0000000000360000-0x000000000037C000-memory.dmpFilesize
112KB