Resubmissions

25-07-2024 14:41

240725-r2tlnstgrl 10

25-07-2024 07:34

240725-jee6rswdjq 10

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 07:34

General

  • Target

    2024-07-25_995bb40bd1e676972428beb4a9cf7f96_wannacry.exe

  • Size

    924KB

  • MD5

    995bb40bd1e676972428beb4a9cf7f96

  • SHA1

    49ee1caa2fdeaf62ed60f61765f0bf3ac4ef040d

  • SHA256

    fdfafaefbc9aa35dea9698a3f95b7c78977c0e3e5ab24e1728cd01f276a8c666

  • SHA512

    30b57dda8b472810e2765634b444a792658e95ddd03d7ca33cd3776a3187787cb321d71f7114a0cd803ead5d8d85ef114b147a632aea613a438f3a0ee25ec579

  • SSDEEP

    12288:B0u0frNC1YM8A/hZA4C81uCpGotomst1MAvDHeDW4Xyyvms6DKtVog/aLYkTIAt2:BuTwNmEaEZ

Malware Config

Extracted

Path

C:\Users\Admin\Documents\OceanCorp.txt

Ransom Note
----> OceanSpy Ransomware, Game Project from OceanCorp Team <---- All of your files have been encrypted and you won't be able to decrypt / Restore them without our help How To Restore Files? You need to buy our special decryption key with Bitcoin to decrypt all your system! How To Get Bitcoin? This is different beetween countries, you can make google search to look what's the available platforms at your country. Many of our customers have reported these sites to be fast and reliable: OKX - https://www.okx.com Coinmama - https://www.coinmama.com Bitpanda - htps://www.bitpanda.com Want to be sure before you pay we can decrypt your files? You can contact us on telegram and send us 1 file, and we will decrypt it for you. Telegram: [ @OceanCorpBot ] Payment information Amount: 0.015 BTC Bitcoin Address: bc1qu34mwa42deh3zl359q3l2wrvh2g5fgwj7vz4re After you pay, please contact us on telegram [ @OceanCorpBot ] and send us the Transaction ID to get your Decryption key. Kind Regards dwShark
URLs

https://www.okx.com

https://www.coinmama.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-25_995bb40bd1e676972428beb4a9cf7f96_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-25_995bb40bd1e676972428beb4a9cf7f96_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2216
        • C:\Windows\system32\vssadmin.exe
          vssadmin delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:2348
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2776
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:972
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:1284
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Windows\system32\wbadmin.exe
          wbadmin delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:1576
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\OceanCorp.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1100
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1712
  • C:\Windows\system32\wbengine.exe
    "C:\Windows\system32\wbengine.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1700
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:1644
    • C:\Windows\System32\vds.exe
      C:\Windows\System32\vds.exe
      1⤵
        PID:2104

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        924KB

        MD5

        995bb40bd1e676972428beb4a9cf7f96

        SHA1

        49ee1caa2fdeaf62ed60f61765f0bf3ac4ef040d

        SHA256

        fdfafaefbc9aa35dea9698a3f95b7c78977c0e3e5ab24e1728cd01f276a8c666

        SHA512

        30b57dda8b472810e2765634b444a792658e95ddd03d7ca33cd3776a3187787cb321d71f7114a0cd803ead5d8d85ef114b147a632aea613a438f3a0ee25ec579

      • C:\Users\Admin\Documents\OceanCorp.txt

        Filesize

        1KB

        MD5

        6f9b7944ea7e3673ce8c80b688da3304

        SHA1

        bcab5884b4003cc590be7f0e790c3aa7cedce002

        SHA256

        b88f67009e798c76966bad77f2acd96f614093cb651ea322bbfeb422fec5b1cd

        SHA512

        200c3af15e3ad1df9c9b6b1e6431ed7dc8302d73be21b512cb6bb082512158e0252656d23a6add65cd0af5bbd235e5e218b660181d3c3c1ddda30450e2120668

      • memory/1108-0-0x000007FEF5EA3000-0x000007FEF5EA4000-memory.dmp

        Filesize

        4KB

      • memory/1108-1-0x0000000000380000-0x000000000046E000-memory.dmp

        Filesize

        952KB

      • memory/2080-7-0x0000000000AD0000-0x0000000000BBE000-memory.dmp

        Filesize

        952KB

      • memory/2080-19-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

        Filesize

        9.9MB

      • memory/2080-22-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

        Filesize

        9.9MB

      • memory/2080-475-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

        Filesize

        9.9MB