Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-08-2024 10:50

General

  • Target

    2024-08-22_e7bd89cb405b3a1e0b34bea003b27ec5_wannacry.exe

  • Size

    217KB

  • MD5

    e7bd89cb405b3a1e0b34bea003b27ec5

  • SHA1

    21061b3432c8e6a56f6b4e7b755d73f072f47f94

  • SHA256

    2a58499667712ca4e34cdf24cb2fa54828e76a254e780c3ac0fbb570f6148bf5

  • SHA512

    d0e592d846f0bc9a47f67036826079fe2ad4d777b52d5cd54bbfd0bf2f2834b54ea75e59ec34b2867aea51377cbd54f1186655d655f09c66ba2ec09407628231

  • SSDEEP

    3072:6ob0Exr9jos+uorMvZprdSyI+gPTfqyYgytVx9T8AOtZCWcW7ubxvOGIx3sBsNkw:P7r9jJ5orwrRS8gPFYTdOjbGXypU5

Malware Config

Extracted

Path

C:\Users\Admin\Documents\wowie.txt

Ransom Note
Your files have been encrypted! All your important files have been encrypted. To regain access, you need to purchase a decryption key. Instructions: 1. Purchase $50 worth of Bitcoin at https://blockchain.com. 2. Email us at [email protected] 3. After we send you the wallet address and you give us the bitcoin, we will give you your decryption key. Important: You have 24 hours to do so. Failure to pay and decrypt your files, they are lost forever. Bonne chance!
URLs

https://blockchain.com

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 34 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-22_e7bd89cb405b3a1e0b34bea003b27ec5_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-22_e7bd89cb405b3a1e0b34bea003b27ec5_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Users\Admin\AppData\Roaming\Quantum.exe
      "C:\Users\Admin\AppData\Roaming\Quantum.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\wowie.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Quantum.exe

    Filesize

    217KB

    MD5

    e7bd89cb405b3a1e0b34bea003b27ec5

    SHA1

    21061b3432c8e6a56f6b4e7b755d73f072f47f94

    SHA256

    2a58499667712ca4e34cdf24cb2fa54828e76a254e780c3ac0fbb570f6148bf5

    SHA512

    d0e592d846f0bc9a47f67036826079fe2ad4d777b52d5cd54bbfd0bf2f2834b54ea75e59ec34b2867aea51377cbd54f1186655d655f09c66ba2ec09407628231

  • C:\Users\Admin\Documents\wowie.txt

    Filesize

    483B

    MD5

    e189fe383205d84d08aaeedc75c49bdf

    SHA1

    dd9e0491edb190f292979b3c470667a2cb32d9cf

    SHA256

    fc6befab05853de97d15e5c143314ed1f1a7c6228f29c136959f04eba981786d

    SHA512

    37383d62295713ced88499b0bd5b828f30559d9bdfa51c2aeda77409eeb0af68de8447309d99829589518a7fb7e10b0271e5ac9a89f3a1f5cf1f7a2e15c39ea3

  • memory/3708-14-0x00007FF9052A0000-0x00007FF905D61000-memory.dmp

    Filesize

    10.8MB

  • memory/3708-22-0x00007FF9052A0000-0x00007FF905D61000-memory.dmp

    Filesize

    10.8MB

  • memory/3708-480-0x00007FF9052A0000-0x00007FF905D61000-memory.dmp

    Filesize

    10.8MB

  • memory/3708-481-0x00007FF9052A0000-0x00007FF905D61000-memory.dmp

    Filesize

    10.8MB

  • memory/4512-0-0x00007FF9052A3000-0x00007FF9052A5000-memory.dmp

    Filesize

    8KB

  • memory/4512-1-0x00000000007A0000-0x00000000007DC000-memory.dmp

    Filesize

    240KB