Malware Analysis Report

2024-08-06 15:50

Sample ID 240526-ap3kdagf38
Target 2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry
SHA256 d573d63d8a5a350f94565a56229f544dad6b1ad2aa63fd724d09e51f093a5324
Tags
chaos ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d573d63d8a5a350f94565a56229f544dad6b1ad2aa63fd724d09e51f093a5324

Threat Level: Known bad

The file 2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry was found to be: Known bad.

Malicious Activity Summary

chaos ransomware spyware stealer

Detects command variations typically used by ransomware

Chaos family

Chaos Ransomware

Chaos

Renames multiple (81) files with added filename extension

Detects command variations typically used by ransomware

Renames multiple (71) files with added filename extension

Reads user/profile data of web browsers

Drops startup file

Executes dropped EXE

Checks computer location settings

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: AddClipboardFormatListener

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Modifies registry class

Opens file in notepad (likely ransom note)

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-26 00:24

Signatures

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Chaos family

chaos

Detects command variations typically used by ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-26 00:24

Reported

2024-05-26 00:26

Platform

win7-20240221-en

Max time kernel

120s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects command variations typically used by ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Renames multiple (81) files with added filename extension

ransomware

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe

"C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe"

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Unlock_FIles.txt

Network

N/A

Files

memory/2172-0-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

memory/2172-1-0x0000000000E40000-0x0000000000E4C000-memory.dmp

C:\Users\Admin\AppData\Roaming\svchost.exe

MD5 473bb234d2c4d704a4ade547eb0d4b86
SHA1 92e86e3295d902e5db0e0f34876cc67c8f6f23a7
SHA256 d573d63d8a5a350f94565a56229f544dad6b1ad2aa63fd724d09e51f093a5324
SHA512 76bd0d9c7cebc238cfda7f193648e480ef10d311208699fd3fba94b0a89bfe81f4b061454dc80e402ef6b2def6385fc00132503b0444d3353c14e1df3051cd43

memory/2248-7-0x000007FEF5513000-0x000007FEF5514000-memory.dmp

memory/2248-8-0x0000000000920000-0x000000000092C000-memory.dmp

memory/2248-38-0x000007FEF5510000-0x000007FEF5EFC000-memory.dmp

C:\Users\Admin\Music\Unlock_FIles.txt

MD5 346bf23d55d0633adde387c99f3bc6b4
SHA1 4e2f231b945831fdc19d97397a3949e1c1ceb06b
SHA256 b3f65aae52119cfbbbb919959b4f0923d36e1b4f81de4f5840e183afc9dd5263
SHA512 0247d480ef9052f04a3cecb7020d2085270ffa4383a61fd7670b6eb07470bc21f282ba470ad1edd4ce150401f8b3ffe7d21dedac30a2427fa0378dcb96733ef4

memory/2248-188-0x000007FEF5513000-0x000007FEF5514000-memory.dmp

memory/2248-189-0x000007FEF5510000-0x000007FEF5EFC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-26 00:24

Reported

2024-05-26 00:26

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Detects command variations typically used by ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Renames multiple (71) files with added filename extension

ransomware

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Roaming\svchost.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.url C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\svchost.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe

"C:\Users\Admin\AppData\Local\Temp\2024-05-26_473bb234d2c4d704a4ade547eb0d4b86_destroyer_wannacry.exe"

C:\Users\Admin\AppData\Roaming\svchost.exe

"C:\Users\Admin\AppData\Roaming\svchost.exe"

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Unlock_FIles.txt

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 145.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 209.143.182.52.in-addr.arpa udp

Files

memory/4200-0-0x0000000000EC0000-0x0000000000ECC000-memory.dmp

memory/4200-1-0x00007FFF67033000-0x00007FFF67035000-memory.dmp

C:\Users\Admin\AppData\Roaming\svchost.exe

MD5 473bb234d2c4d704a4ade547eb0d4b86
SHA1 92e86e3295d902e5db0e0f34876cc67c8f6f23a7
SHA256 d573d63d8a5a350f94565a56229f544dad6b1ad2aa63fd724d09e51f093a5324
SHA512 76bd0d9c7cebc238cfda7f193648e480ef10d311208699fd3fba94b0a89bfe81f4b061454dc80e402ef6b2def6385fc00132503b0444d3353c14e1df3051cd43

memory/4396-14-0x00007FFF67030000-0x00007FFF67AF1000-memory.dmp

C:\Users\Admin\Music\Unlock_FIles.txt

MD5 346bf23d55d0633adde387c99f3bc6b4
SHA1 4e2f231b945831fdc19d97397a3949e1c1ceb06b
SHA256 b3f65aae52119cfbbbb919959b4f0923d36e1b4f81de4f5840e183afc9dd5263
SHA512 0247d480ef9052f04a3cecb7020d2085270ffa4383a61fd7670b6eb07470bc21f282ba470ad1edd4ce150401f8b3ffe7d21dedac30a2427fa0378dcb96733ef4

memory/4396-174-0x00007FFF67030000-0x00007FFF67AF1000-memory.dmp