Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 05:28

General

  • Target

    2024-08-08_dde52cb8bacc386bc04bf8a8b47cc2d7_destroyer_wannacry.exe

  • Size

    43KB

  • MD5

    dde52cb8bacc386bc04bf8a8b47cc2d7

  • SHA1

    55b70d1baba415b30712adb7d4b8316f3fade4bb

  • SHA256

    b49f0ce758264355e239922c949c0f012703e71f93ba09c156464654abcf3446

  • SHA512

    33d6b7443de07ccd919e135b961f5abd6aac32b843ddddbea513b9d99777fa1cba24f92f689f3177127b54253cdb2f065658b5e78b7e966f2ae6e98d7c24db1c

  • SSDEEP

    768:2n3kIeKpsyjWKr9S2fECoNgYxtw3UnqHM3K4e5:03kIljWKr9SYjoNgctw3jt5

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-08_dde52cb8bacc386bc04bf8a8b47cc2d7_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-08_dde52cb8bacc386bc04bf8a8b47cc2d7_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    43KB

    MD5

    dde52cb8bacc386bc04bf8a8b47cc2d7

    SHA1

    55b70d1baba415b30712adb7d4b8316f3fade4bb

    SHA256

    b49f0ce758264355e239922c949c0f012703e71f93ba09c156464654abcf3446

    SHA512

    33d6b7443de07ccd919e135b961f5abd6aac32b843ddddbea513b9d99777fa1cba24f92f689f3177127b54253cdb2f065658b5e78b7e966f2ae6e98d7c24db1c

  • C:\Users\Admin\Desktop\read_it.txt

    Filesize

    286B

    MD5

    5bc1254279a2c830d73649b46704d375

    SHA1

    e5c843e2b306dd3ceac50684ab963bf2becd2ab1

    SHA256

    88ba3a652fc9e05fb083b0eab75630d29482743cf548f98e4fdce24368f95b4b

    SHA512

    fb289527989ddb6a572c4bc75cceb3063f4952ee14be44620947a437635ee9b4b62968bc08e3ad2571afba31bcb4d7792ef01f9afe8570cc7085a1d70af10c08

  • memory/3932-0-0x0000000000E40000-0x0000000000E52000-memory.dmp

    Filesize

    72KB

  • memory/3932-1-0x00007FFF544B3000-0x00007FFF544B5000-memory.dmp

    Filesize

    8KB

  • memory/4616-14-0x00007FFF544B0000-0x00007FFF54F71000-memory.dmp

    Filesize

    10.8MB

  • memory/4616-78-0x00007FFF544B0000-0x00007FFF54F71000-memory.dmp

    Filesize

    10.8MB