General
-
Target
2024-06-11_a89e9e8e5656a507c4b50df1a8c191c4_chaos_destroyer_wannacry
-
Size
24KB
-
Sample
240611-klfljs1bkb
-
MD5
a89e9e8e5656a507c4b50df1a8c191c4
-
SHA1
cb0332c6a4922ed95b69d4c9dd3a41b5c5215b16
-
SHA256
d31d36daa5478fdcfe3c3a2ea67fb72d39f961a96d00f09dd90bc8ba84ef94a3
-
SHA512
9ab3fa27dae99cda9ffe0ed7f19b1724443731e447e115530410448d6f8e014784f4d3feb16cf208ba006d7c5bcb56291478208316a3fb08ccc781dcde6e3a84
-
SSDEEP
384:ln+mhVbzo4SS0QQS++EJyAblcQBJxMKhM7b45N5K:4sk4h0fbtGKhM7bAN0
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_a89e9e8e5656a507c4b50df1a8c191c4_chaos_destroyer_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-11_a89e9e8e5656a507c4b50df1a8c191c4_chaos_destroyer_wannacry.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\read_it.txt
chaos
Targets
-
-
Target
2024-06-11_a89e9e8e5656a507c4b50df1a8c191c4_chaos_destroyer_wannacry
-
Size
24KB
-
MD5
a89e9e8e5656a507c4b50df1a8c191c4
-
SHA1
cb0332c6a4922ed95b69d4c9dd3a41b5c5215b16
-
SHA256
d31d36daa5478fdcfe3c3a2ea67fb72d39f961a96d00f09dd90bc8ba84ef94a3
-
SHA512
9ab3fa27dae99cda9ffe0ed7f19b1724443731e447e115530410448d6f8e014784f4d3feb16cf208ba006d7c5bcb56291478208316a3fb08ccc781dcde6e3a84
-
SSDEEP
384:ln+mhVbzo4SS0QQS++EJyAblcQBJxMKhM7b45N5K:4sk4h0fbtGKhM7bAN0
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-