Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 11:42
Behavioral task
behavioral1
Sample
2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe
-
Size
97KB
-
MD5
e6a7219ab68c2f6796911315ae386ab5
-
SHA1
4a0dc1b3d2216ad157f437195d5424e633181130
-
SHA256
1b4f33ff0e4a09ee9ca4e008ca2f0d396c667ff04c1c181377e908df5131e5b0
-
SHA512
771b3f617f58946c7117c5e63651f8109336e0851b8d0d354a6a4a5395b48abcfc90579afd69fc44403cd5c80e4d936459f3e74c57ddc875523e0de0a3936968
-
SSDEEP
1536:FMwpgzZ8+1oqDAYkjeNY+RchBuwl/lrY0/x4GWB+Zi++VI11Y4qmFr9HIR8B:WwpgZFbJchBuihsZVE1Y4qmFr9HIR8B
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
resource yara_rule behavioral1/memory/1176-1-0x00000000010F0000-0x000000000110E000-memory.dmp family_chaos -
Loads dropped DLL 1 IoCs
pid Process 1176 2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1176 2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe 1176 2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe 1176 2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1176 2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-22_e6a7219ab68c2f6796911315ae386ab5_destroyer_wannacry.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5d80d1b6d9a6d5986fa47f6f8487030e1
SHA18f5773bf9eca43b079c1766b2e9f44cc90bd9215
SHA256446128f1712da8064d0197376184315cb529ed26ed9122f7b171bb208e22c0c3
SHA5129fcf0105c2c9ee81c526d41633d93579bb8e2837989d77fb4a6523440415ec2d7fa46ac9ae4e55ecebd99126837817ac308cc079475de02667b21727a43d74cc