General
-
Target
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry
-
Size
27KB
-
Sample
240611-le85yssapc
-
MD5
c4e33d7fd77461b59abd3c3fa3bb2581
-
SHA1
0664f4e2a19a83fb8116586efe5841b176a8ac1c
-
SHA256
13093afa52908c4ae621f363fa63a68d204b0c895815a94f2924b8d289b388d1
-
SHA512
33f574a12b4209f8d04e1ad8daa54ec0bf6d42e5ca0f3d259dcda7781b9955d4b5148fadc0d22dde83da727295834689d0ca388785e8cc03903793b5837c5d76
-
SSDEEP
384:MftWZPzzxAm1vp5ZRoDCFKW6pAnAQ51Ml4Oy5o91fDpC82vy:MW7zxAmpfyCz6pVQ53ho9hDo82a
Behavioral task
behavioral1
Sample
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\read_it.txt
Targets
-
-
Target
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry
-
Size
27KB
-
MD5
c4e33d7fd77461b59abd3c3fa3bb2581
-
SHA1
0664f4e2a19a83fb8116586efe5841b176a8ac1c
-
SHA256
13093afa52908c4ae621f363fa63a68d204b0c895815a94f2924b8d289b388d1
-
SHA512
33f574a12b4209f8d04e1ad8daa54ec0bf6d42e5ca0f3d259dcda7781b9955d4b5148fadc0d22dde83da727295834689d0ca388785e8cc03903793b5837c5d76
-
SSDEEP
384:MftWZPzzxAm1vp5ZRoDCFKW6pAnAQ51Ml4Oy5o91fDpC82vy:MW7zxAmpfyCz6pVQ53ho9hDo82a
-
Chaos Ransomware
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-