Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 10:05

General

  • Target

    2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe

  • Size

    198KB

  • MD5

    982205e6e14967f94ae81e43e212a269

  • SHA1

    430cbbe633775c0615e25cbff99bcc8cd8bc9f9c

  • SHA256

    e4afe033561fe5bc752c5df8698c103ad815b61162aabe66c2d1c4df179662a6

  • SHA512

    634c8284743a0efc992ab130df7129ff7549f09cb92935c86b0af481dfbdc47df0e627d3c530a0491428700d0dc92723651223517b4732b8b08930cf4535aa7b

  • SSDEEP

    3072:doojKRmr9PZS/+Xrl1VrHQW6CURgeXd0z7bLvgQMFLesUDjzCKCMlA4tIrZJVrSW:Nr9PLTQDNYr5XO6A4tIrRSc1

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 3 IoCs
  • Chaos family
  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Beni Oku.txt
        3⤵
          PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      198KB

      MD5

      982205e6e14967f94ae81e43e212a269

      SHA1

      430cbbe633775c0615e25cbff99bcc8cd8bc9f9c

      SHA256

      e4afe033561fe5bc752c5df8698c103ad815b61162aabe66c2d1c4df179662a6

      SHA512

      634c8284743a0efc992ab130df7129ff7549f09cb92935c86b0af481dfbdc47df0e627d3c530a0491428700d0dc92723651223517b4732b8b08930cf4535aa7b

    • C:\Users\Admin\Music\Beni Oku.txt

      Filesize

      543B

      MD5

      332815cac9d93b86adaf6104ca6d9687

      SHA1

      6f6c5f5e994ae85890627c7893a53423d0b74c95

      SHA256

      49af03004f75fc1a1fd95415f7d21ed05ff6b90d786bdcca0256289dbf10a263

      SHA512

      c991517e7c58c430e0488b6325584164086aaa1478c3cce4dffa7fca8fb09e9113a3b33948e99364cee02752b90a899c289f2615572e8d6ab9834c0a8fe14d27

    • memory/2060-7-0x0000000000FE0000-0x0000000001018000-memory.dmp

      Filesize

      224KB

    • memory/2060-18-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2060-28-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2060-64-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2168-0-0x000007FEF5B03000-0x000007FEF5B04000-memory.dmp

      Filesize

      4KB

    • memory/2168-1-0x0000000000A20000-0x0000000000A58000-memory.dmp

      Filesize

      224KB