Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 01:31

General

  • Target

    2024-05-26_63263c7764df5469c6683700699f9d1a_wannacry.exe

  • Size

    2.4MB

  • MD5

    63263c7764df5469c6683700699f9d1a

  • SHA1

    a11de9cb5acd9b04fbbd3d4568a53713c7c3bd40

  • SHA256

    79fe78a198078c1810a45cd7ff8f97292b3a15c4ec65601f979be576a424e9ac

  • SHA512

    207c04f5d08230200ab0908b4f719ecb2d0085ffd26dfe6461c9fdb12e6cbe9736326338851291de65137019ab52ace2230d0fac1592cf3965f8ccbaf2a30a73

  • SSDEEP

    1536:jpHBovOj4CPN0iyR5KXzik7t3ZVw3GaalZJlrw+TBSD5vl/xvzWWvoqd:ZBoQ2RGaallrnUBlJ6o

Malware Config

Signatures

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Detects command variations typically used by ransomware 1 IoCs
  • Renames multiple (807) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 64 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-26_63263c7764df5469c6683700699f9d1a_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-26_63263c7764df5469c6683700699f9d1a_wannacry.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set opmode mode=disable profile=all
      2⤵
      • Modifies Windows Firewall
      PID:2652
    • C:\Windows\SysWOW64\vssadmin.exe
      vssadmin Delete Shadows /all /quiet
      2⤵
      • Interacts with shadow copies
      PID:2640
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic shadowcopy delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2732
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe user32.dll,UpdatePerUserSystemParameters
      2⤵
        PID:2444
      • C:\Users\Admin\Desktop\GlitchByte_Decryptor.exe
        C:\Users\Admin\Desktop\GlitchByte_Decryptor.exe
        2⤵
        • Executes dropped EXE
        PID:2696
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2508

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Windows Management Instrumentation

    1
    T1047

    Persistence

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Privilege Escalation

    Create or Modify System Process

    1
    T1543

    Windows Service

    1
    T1543.003

    Defense Evasion

    Indicator Removal

    2
    T1070

    File Deletion

    2
    T1070.004

    Impair Defenses

    1
    T1562

    Disable or Modify System Firewall

    1
    T1562.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Collection

    Data from Local System

    1
    T1005

    Impact

    Inhibit System Recovery

    2
    T1490

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000005.log
      Filesize

      8B

      MD5

      7f49f19ddb99db64a6aa9486ef6658e5

      SHA1

      f233f9413b9cc1c27e61308b6b5d5e56c7341d45

      SHA256

      a5ddc96ed1f312cb639277840a89c8859f88ffd36a5962b87429fd0e94feb41f

      SHA512

      4634feaaa7de377b4bb8bc5ff5649f4ef0b8f37f2338d2d032ae2956c6f35aba1ecd9672c3e46bfb30d64e8584f78032e8ab738ddbf01e44e8b8532e74192159

    • \Users\Admin\Desktop\GlitchByte_Decryptor.exe
      Filesize

      59KB

      MD5

      bfb533cf1b36ee071912539947b6e293

      SHA1

      829ab8fea8390419739749a5f10a6514b38f81cf

      SHA256

      0d8217a51648efeb075d73389c826430209eca07422fb8d035de9c00bd5ab96c

      SHA512

      d1f68827ff6d937a9a46b390f6ddbf58b7cc644fce648b16342eafc0f85788261a4b126f5582528b34af32fd20b964738dd052bfe255cac1438780500354fb83

    • memory/1240-1373-0x0000000000BF0000-0x0000000000E57000-memory.dmp
      Filesize

      2.4MB

    • memory/2696-1618-0x00000000010E0000-0x00000000010F2000-memory.dmp
      Filesize

      72KB