Malware Analysis Report

2024-10-19 07:14

Sample ID 240914-c7rxpstejf
Target 2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry
SHA256 aaf3cf701b06ca873f9fdbf5b4ba33722c6ecea49316a344df35926a45bce1fb
Tags
chaos ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

aaf3cf701b06ca873f9fdbf5b4ba33722c6ecea49316a344df35926a45bce1fb

Threat Level: Known bad

The file 2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry was found to be: Known bad.

Malicious Activity Summary

chaos ransomware

Chaos Ransomware

Chaos family

Chaos

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-09-14 02:43

Signatures

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Chaos family

chaos

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-14 02:43

Reported

2024-09-14 02:45

Platform

win7-20240903-en

Max time kernel

120s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe

"C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe"

Network

N/A

Files

memory/2336-0-0x000007FEF62E3000-0x000007FEF62E4000-memory.dmp

memory/2336-1-0x0000000000070000-0x00000000000FC000-memory.dmp

memory/2336-2-0x000007FEF62E0000-0x000007FEF6CCC000-memory.dmp

memory/2336-3-0x000007FEF62E0000-0x000007FEF6CCC000-memory.dmp

memory/2336-4-0x000007FEF62E0000-0x000007FEF6CCC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-14 02:43

Reported

2024-09-14 02:45

Platform

win10v2004-20240802-en

Max time kernel

93s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe"

Signatures

Chaos

ransomware chaos

Chaos Ransomware

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe

"C:\Users\Admin\AppData\Local\Temp\2024-09-14_f257d37c05d29e725071a900ef49f1c9_wannacry.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp

Files

memory/3128-0-0x00007FFE56CC3000-0x00007FFE56CC5000-memory.dmp

memory/3128-1-0x0000000000990000-0x0000000000A1C000-memory.dmp

memory/3128-2-0x00007FFE56CC0000-0x00007FFE57781000-memory.dmp

memory/3128-3-0x00007FFE56CC0000-0x00007FFE57781000-memory.dmp

memory/3128-4-0x00007FFE56CC3000-0x00007FFE56CC5000-memory.dmp

memory/3128-5-0x00007FFE56CC0000-0x00007FFE57781000-memory.dmp