Analysis

  • max time kernel
    132s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 19:39

General

  • Target

    2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe

  • Size

    47KB

  • MD5

    825237535c11ac8b38d3227a9b0d68e4

  • SHA1

    afb3d9a122d1f9c5149148ead8fdeabc8f065648

  • SHA256

    d139cf9992044e972e139f409f80f7c944ae0e03541fc3fb85f0e78a1ca03440

  • SHA512

    6d9a7953149d979985f470746f0f53d637e85aaaef6d50b0ee2a4af5654677784b13064caab49f51ac1e9497af13b66c36954f10b7def7ecc8f66e57e1970419

  • SSDEEP

    768:NYqo2ycN9EpGkmc1mEnHr9usUMmT/meMFAavvlXRIrpCZ4EFkrY7IB7e5:Zo21X3lEnHr9uymjBavvlXRSCtFaYMBe

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Detects command variations typically used by ransomware 2 IoCs
  • Renames multiple (207) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-04_825237535c11ac8b38d3227a9b0d68e4_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_me.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:5104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    47KB

    MD5

    825237535c11ac8b38d3227a9b0d68e4

    SHA1

    afb3d9a122d1f9c5149148ead8fdeabc8f065648

    SHA256

    d139cf9992044e972e139f409f80f7c944ae0e03541fc3fb85f0e78a1ca03440

    SHA512

    6d9a7953149d979985f470746f0f53d637e85aaaef6d50b0ee2a4af5654677784b13064caab49f51ac1e9497af13b66c36954f10b7def7ecc8f66e57e1970419

  • C:\Users\Admin\Documents\read_me.txt

    Filesize

    211B

    MD5

    555181e356e52cf25787d4028f1e7388

    SHA1

    780812b54aa7483f05c2088184f7418a335c2312

    SHA256

    c7c665cf92588d092af5b0878503c49fb7cceb0a523b43edd819d26aabb84072

    SHA512

    5bacd730843c8b3e5c09c6bdaea0e03c04f498ead9b9844afb05a61c0a52c8af63ebcd9dddad33ddab93c6a18223e9b89e04eb6faaee9684c204c6599c9e4317

  • memory/3652-0-0x0000000000320000-0x0000000000332000-memory.dmp

    Filesize

    72KB

  • memory/3652-1-0x00007FFBA6863000-0x00007FFBA6865000-memory.dmp

    Filesize

    8KB

  • memory/4072-14-0x00007FFBA6860000-0x00007FFBA7321000-memory.dmp

    Filesize

    10.8MB

  • memory/4072-483-0x00007FFBA6860000-0x00007FFBA7321000-memory.dmp

    Filesize

    10.8MB