Analysis

  • max time kernel
    21s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2024 12:36

General

  • Target

    2024-08-04_3dc9bad7720a01598aa14e55baca7413_wannacry.exe

  • Size

    417KB

  • MD5

    3dc9bad7720a01598aa14e55baca7413

  • SHA1

    99668a82a34ec17340fccecbc2ef0985b84704a0

  • SHA256

    a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0

  • SHA512

    567581747132d56595c719e4d454bf6e73ba941581701b28287559f899ea5813a0abb7ff2df25cb3d7c99d3203c8a8ab361ea37b3b8e8392748fb855ee4cbaba

  • SSDEEP

    6144:Jr9Zzp4MmFrxodIFRfiM6baHcgrRS8gPFYTdOjbGXypU5:Jp4MmxxhfiMzcyRQFYTdqTa

Malware Config

Extracted

Path

C:\Users\Admin\Documents\welp.txt

Ransom Note
Hello there! All your files are encrypted, but do not worry, if you're not poor that is. If you send us 50$ worth of Bitcoin, you will get a key that will decrypt all your files! Yipeeeee! Contact us at [email protected] After you send the $50 worth of BTC to the wallet, you will receive the key. Don't try to use any third party software to decrypt your files if you don't want to lose all your data.

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-04_3dc9bad7720a01598aa14e55baca7413_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-04_3dc9bad7720a01598aa14e55baca7413_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Roaming\quantum.exe
      "C:\Users\Admin\AppData\Roaming\quantum.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\welp.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\quantum.exe

    Filesize

    417KB

    MD5

    3dc9bad7720a01598aa14e55baca7413

    SHA1

    99668a82a34ec17340fccecbc2ef0985b84704a0

    SHA256

    a54a38a9aab0bde31b2065d8b88a8e6569cc66c3f6137379b6b5a62361c319f0

    SHA512

    567581747132d56595c719e4d454bf6e73ba941581701b28287559f899ea5813a0abb7ff2df25cb3d7c99d3203c8a8ab361ea37b3b8e8392748fb855ee4cbaba

  • C:\Users\Admin\Documents\welp.txt

    Filesize

    427B

    MD5

    025e685a33afef1bb7772b41f46d5700

    SHA1

    39c246daf9003a7a38cfb2edb5f66b2766c65c39

    SHA256

    fc4d2fe0b5c84f7ffa475e1cf9da6185e8bb162a03899bcfe015df64778cc380

    SHA512

    1d3d29da8bb4390ebe563e046d382ced7e1d4abb7870f4a7bee64683d3ae236375492b7ad7fb3e64c800859cf80da43406243f2e5bd36bc262e7bff1e5168b29

  • memory/1532-7-0x00000000013E0000-0x000000000144E000-memory.dmp

    Filesize

    440KB

  • memory/1532-9-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

    Filesize

    9.9MB

  • memory/1532-16-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

    Filesize

    9.9MB

  • memory/1532-456-0x000007FEF60D0000-0x000007FEF6ABC000-memory.dmp

    Filesize

    9.9MB

  • memory/3060-0-0x000007FEF60D3000-0x000007FEF60D4000-memory.dmp

    Filesize

    4KB

  • memory/3060-1-0x00000000012D0000-0x000000000133E000-memory.dmp

    Filesize

    440KB