Behavioral task
behavioral1
Sample
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry
-
Size
27KB
-
MD5
c4e33d7fd77461b59abd3c3fa3bb2581
-
SHA1
0664f4e2a19a83fb8116586efe5841b176a8ac1c
-
SHA256
13093afa52908c4ae621f363fa63a68d204b0c895815a94f2924b8d289b388d1
-
SHA512
33f574a12b4209f8d04e1ad8daa54ec0bf6d42e5ca0f3d259dcda7781b9955d4b5148fadc0d22dde83da727295834689d0ca388785e8cc03903793b5837c5d76
-
SSDEEP
384:MftWZPzzxAm1vp5ZRoDCFKW6pAnAQ51Ml4Oy5o91fDpC82vy:MW7zxAmpfyCz6pVQ53ho9hDo82a
Malware Config
Signatures
-
Chaos Ransomware 1 IoCs
resource yara_rule sample family_chaos -
Chaos family
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry
Files
-
2024-06-11_c4e33d7fd77461b59abd3c3fa3bb2581_destroyer_wannacry.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ