Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 07:38
Behavioral task
behavioral1
Sample
2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe
-
Size
88KB
-
MD5
47cb4cb930541788a53da6337f726dc8
-
SHA1
2d7297e0469e51784b44212c795bae5237c314dc
-
SHA256
635adb7c70d41a43be40469bd0a517e8feb8a9ddb3e68f0ead3c2a4b82875213
-
SHA512
cfd584a481a8416900d0d081e81c5da1206c2723a39b02225afbfb636f5d81e705b425816e9498cc089daa7e387434af4d1a1ffc866181c43af3f5b83fa796a2
-
SSDEEP
1536:Co27Ggr90aa8ZkYU2Jm6Ywm2vmyzuXpXppfpp0ppzpphppypp9poppTp:CoUGgr90H86wm2vZy
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 2 IoCs
resource yara_rule behavioral2/memory/2504-0-0x0000000000A00000-0x0000000000A1C000-memory.dmp family_chaos behavioral2/files/0x0012000000016964-6.dat family_chaos -
Detects command variations typically used by ransomware 2 IoCs
resource yara_rule behavioral2/memory/2504-0-0x0000000000A00000-0x0000000000A1C000-memory.dmp INDICATOR_SUSPICIOUS_GENRansomware behavioral2/files/0x0012000000016964-6.dat INDICATOR_SUSPICIOUS_GENRansomware -
Renames multiple (195) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 마인크래프트 무료설치.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt 마인크래프트 무료설치.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\마인크래프트 무료설치.url 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 마인크래프트 무료설치.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 마인크래프트 무료설치.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\Searches\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 마인크래프트 무료설치.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Links\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Music\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Public\Documents\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Public\Videos\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Public\Music\desktop.ini 마인크래프트 무료설치.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 마인크래프트 무료설치.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings 마인크래프트 무료설치.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4964 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3672 마인크래프트 무료설치.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe 3672 마인크래프트 무료설치.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe Token: SeDebugPrivilege 3672 마인크래프트 무료설치.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 3672 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 84 PID 2504 wrote to memory of 3672 2504 2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe 84 PID 3672 wrote to memory of 4964 3672 마인크래프트 무료설치.exe 86 PID 3672 wrote to memory of 4964 3672 마인크래프트 무료설치.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_47cb4cb930541788a53da6337f726dc8_destroyer_wannacry.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\마인크래프트 무료설치.exe"C:\Users\Admin\AppData\Roaming\마인크래프트 무료설치.exe"2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD547cb4cb930541788a53da6337f726dc8
SHA12d7297e0469e51784b44212c795bae5237c314dc
SHA256635adb7c70d41a43be40469bd0a517e8feb8a9ddb3e68f0ead3c2a4b82875213
SHA512cfd584a481a8416900d0d081e81c5da1206c2723a39b02225afbfb636f5d81e705b425816e9498cc089daa7e387434af4d1a1ffc866181c43af3f5b83fa796a2
-
Filesize
641B
MD5b91469b8c47041b5b5a04581fab689d2
SHA1562ce0e37bc596854d8f664f255f40c05e42f565
SHA256a82a92f952293fbea756de18927fc0a6091d65b7c23bfe45b61f9e876c474c69
SHA5123b39eddab0d4aaf6c1c0a51e720d031d2b21df5ab0df69860b9ffb92680e27ee4ae57e9e25bde31ca4c4424970f4f72bfc371bbca78055ede83d2b737efafaa4