General
-
Target
2024-10-28_447e7a2f21a3c0a1f0be38dd189d9b44_destroyer_wannacry
-
Size
27KB
-
Sample
241028-3egjdaxnfq
-
MD5
447e7a2f21a3c0a1f0be38dd189d9b44
-
SHA1
0e48b7f5a701e15bef22cf073e6659c9f1eb38dd
-
SHA256
cbbf7dfd8675318f248ada8eda44d7cb9f0ccf1d221340d743a394ffa9ea83bd
-
SHA512
b463d858b567cb472e484fbbacefe76c7ce9211c2434fce5e05b19152f41b960307396fd0e95f6bca485a6ea0d90a9ed838ed3f86df1c37f0f194bc4a97e1da6
-
SSDEEP
384:CtWZPzzxAm1vZTyHFjhFKW6pjwhnAQ5cHlkOy5o91GXzRpz82vp:H7zxAmiJhz6pjxQ5Dho9UXz3z82B
Behavioral task
behavioral1
Sample
2024-10-28_447e7a2f21a3c0a1f0be38dd189d9b44_destroyer_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-28_447e7a2f21a3c0a1f0be38dd189d9b44_destroyer_wannacry.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\read_it.txt
Targets
-
-
Target
2024-10-28_447e7a2f21a3c0a1f0be38dd189d9b44_destroyer_wannacry
-
Size
27KB
-
MD5
447e7a2f21a3c0a1f0be38dd189d9b44
-
SHA1
0e48b7f5a701e15bef22cf073e6659c9f1eb38dd
-
SHA256
cbbf7dfd8675318f248ada8eda44d7cb9f0ccf1d221340d743a394ffa9ea83bd
-
SHA512
b463d858b567cb472e484fbbacefe76c7ce9211c2434fce5e05b19152f41b960307396fd0e95f6bca485a6ea0d90a9ed838ed3f86df1c37f0f194bc4a97e1da6
-
SSDEEP
384:CtWZPzzxAm1vZTyHFjhFKW6pjwhnAQ5cHlkOy5o91GXzRpz82vp:H7zxAmiJhz6pjxQ5Dho9UXz3z82B
Score10/10-
Chaos Ransomware
-
Chaos family
-
Modifies boot configuration data using bcdedit
-
Renames multiple (175) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-