Resubmissions

05-08-2024 04:54

240805-fjvkga1eqb 10

25-06-2024 22:21

240625-19myjazarq 10

Analysis

  • max time kernel
    35s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 04:54

General

  • Target

    2024-06-25_1ce3b67e179c8420bd5b31e75b4427ca_blackcat_maui_nokoyawa_wannacry.exe

  • Size

    13.4MB

  • MD5

    1ce3b67e179c8420bd5b31e75b4427ca

  • SHA1

    4090622f0eadc1b420aa5d55e31ca5cd45e05f12

  • SHA256

    df9498892ae72f611128c9a8bc57b93964f34cc235f5aaf57fe10fb2b3c69aa3

  • SHA512

    c708cc271fad1ecd29fccb010a34f54ba7b885d8827351a5d8be49f4781185248e789c3e35fa1c7862fdc0bf303e1d97f2585023e0b9fd14db3181f55d276f5f

  • SSDEEP

    98304:aRqeZPPm0Rgmt7M17Lu1zdfj7zyg5oo5AZx8U8qPoBhLTlL4DQWVYHL9fu4h84MR:aMygJ9edfbhSo5Kp8qPKlL8QgYVhqn

Malware Config

Signatures

  • Azov

    A wiper seeking only damage, first seen in 2022.

  • Renames multiple (167) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-25_1ce3b67e179c8420bd5b31e75b4427ca_blackcat_maui_nokoyawa_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-25_1ce3b67e179c8420bd5b31e75b4427ca_blackcat_maui_nokoyawa_wannacry.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:1592
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\OutRepair.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt

    Filesize

    2KB

    MD5

    78ede93114e65f9160fd03d3357c56e6

    SHA1

    88d531b101e57655f1d0d26c6b3257aa2468d460

    SHA256

    c97412fbf88da8f91099a52888dea4c3f222cd95af3e681e3271cbca8b6b7bb5

    SHA512

    074a4c741273902ccacb6f573b96d8accedb2ee405dbd04350cdbf54d180c1fd577a4e90c2aae26bf72f3782403f4494db6e3501a04cfd9d7d81a6bc14884b9d

  • C:\Users\Admin\AppData\Local\Temp\TCD912.tmp\gb.xsl

    Filesize

    262KB

    MD5

    51d32ee5bc7ab811041f799652d26e04

    SHA1

    412193006aa3ef19e0a57e16acf86b830993024a

    SHA256

    6230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97

    SHA512

    5fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

    Filesize

    378B

    MD5

    a64aebd3a820a6466b25bbf3abe7132e

    SHA1

    e850dc16a3729455001bd795e930b6a9cae5140b

    SHA256

    a0a234693a4129a36319d99f9e28b3976f4d208caedd063314320bc72b49bd34

    SHA512

    c748032e092834b1fef03902c520f252f5803ea825811c6599cca89cf25adad1508954a1543c9516a4f7a718d63aaf4e473dbf3b5fa1653c7b2616ca5ee6f719

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    16B

    MD5

    d29962abc88624befc0135579ae485ec

    SHA1

    e40a6458296ec6a2427bcb280572d023a9862b31

    SHA256

    a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

    SHA512

    4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    0bdb060c5184062914442f0c39f96144

    SHA1

    6c0066204e353843f7ade037de98b7f92d9b2ccf

    SHA256

    1e467a1c9501970454db0b7f64d8d1e14f5147f1f11b6b94639c75e83ac1f781

    SHA512

    3ddc4a226daf3b84c6bbb97f24ae8a5a336f7222f3a3d8f5a7f0d0bd2cb2bc147602a7656589caace9f8f64300416abe2e6d7c50ea8ed7f9db29f0de8d498031

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    85243850d033df22f3a4bd8de8001f8f

    SHA1

    eecbe71698823118f713624b125cd20577c61a95

    SHA256

    ed8bcd23fa202812e80988456de9c3e1cde040d1c6118e9965d2612320ca4745

    SHA512

    474826ab23c192bb3debd1959c835eeb13267018ef298eae62b87aeafb6b5f2700e0839dba2f38a53fefd7f53dbfef4040b22069022af345c42d1f05b4a5b273

  • C:\Users\Admin\AppData\Roaming\Microsoft\Word\AutoRecovery save of OutRepair.asd

    Filesize

    34KB

    MD5

    c8e1124a94a345392afd92044bc83807

    SHA1

    ec7e347c6d48cf08bf8fd6b4af7cf81db3c5eee1

    SHA256

    1c8b4463b00ca644d8f92fc963bd4e0264b06f8547b36afc008f6451948db71e

    SHA512

    2ec3656b2ca88549b76f019199ccf863c371a612b11192b76f9146e3881b4a8275cfb36ec92d469a64b47584208b612c2ea4e135abac65a563675b22f4e62f64

  • memory/1592-0-0x0000000000540000-0x0000000000544000-memory.dmp

    Filesize

    16KB

  • memory/1592-3-0x0000000000530000-0x0000000000535000-memory.dmp

    Filesize

    20KB

  • memory/1592-7-0x0000000000530000-0x0000000000535000-memory.dmp

    Filesize

    20KB

  • memory/1592-6-0x0000000000540000-0x0000000000544000-memory.dmp

    Filesize

    16KB

  • memory/1592-13-0x0000000000530000-0x0000000000535000-memory.dmp

    Filesize

    20KB

  • memory/1592-12-0x0000000000500000-0x0000000000507000-memory.dmp

    Filesize

    28KB

  • memory/1592-2-0x0000000140000000-0x000000014003E000-memory.dmp

    Filesize

    248KB

  • memory/4752-546-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-552-0x00007FFE210A0000-0x00007FFE210B0000-memory.dmp

    Filesize

    64KB

  • memory/4752-551-0x00007FFE210A0000-0x00007FFE210B0000-memory.dmp

    Filesize

    64KB

  • memory/4752-550-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-549-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-548-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-547-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-939-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-941-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-940-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB

  • memory/4752-942-0x00007FFE235F0000-0x00007FFE23600000-memory.dmp

    Filesize

    64KB