Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-05-2024 19:39

General

  • Target

    2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe

  • Size

    47KB

  • MD5

    825237535c11ac8b38d3227a9b0d68e4

  • SHA1

    afb3d9a122d1f9c5149148ead8fdeabc8f065648

  • SHA256

    d139cf9992044e972e139f409f80f7c944ae0e03541fc3fb85f0e78a1ca03440

  • SHA512

    6d9a7953149d979985f470746f0f53d637e85aaaef6d50b0ee2a4af5654677784b13064caab49f51ac1e9497af13b66c36954f10b7def7ecc8f66e57e1970419

  • SSDEEP

    768:NYqo2ycN9EpGkmc1mEnHr9usUMmT/meMFAavvlXRIrpCZ4EFkrY7IB7e5:Zo21X3lEnHr9uymjBavvlXRSCtFaYMBe

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Detects command variations typically used by ransomware 3 IoCs
  • Renames multiple (195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_me.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    47KB

    MD5

    825237535c11ac8b38d3227a9b0d68e4

    SHA1

    afb3d9a122d1f9c5149148ead8fdeabc8f065648

    SHA256

    d139cf9992044e972e139f409f80f7c944ae0e03541fc3fb85f0e78a1ca03440

    SHA512

    6d9a7953149d979985f470746f0f53d637e85aaaef6d50b0ee2a4af5654677784b13064caab49f51ac1e9497af13b66c36954f10b7def7ecc8f66e57e1970419

  • C:\Users\Admin\Documents\read_me.txt

    Filesize

    211B

    MD5

    555181e356e52cf25787d4028f1e7388

    SHA1

    780812b54aa7483f05c2088184f7418a335c2312

    SHA256

    c7c665cf92588d092af5b0878503c49fb7cceb0a523b43edd819d26aabb84072

    SHA512

    5bacd730843c8b3e5c09c6bdaea0e03c04f498ead9b9844afb05a61c0a52c8af63ebcd9dddad33ddab93c6a18223e9b89e04eb6faaee9684c204c6599c9e4317

  • memory/2328-7-0x0000000000A80000-0x0000000000A92000-memory.dmp

    Filesize

    72KB

  • memory/2328-12-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2328-18-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2328-454-0x000007FEF5D40000-0x000007FEF672C000-memory.dmp

    Filesize

    9.9MB

  • memory/2612-0-0x000007FEF5D43000-0x000007FEF5D44000-memory.dmp

    Filesize

    4KB

  • memory/2612-1-0x0000000000E10000-0x0000000000E22000-memory.dmp

    Filesize

    72KB