Analysis

  • max time kernel
    94s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 10:05

General

  • Target

    2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe

  • Size

    198KB

  • MD5

    982205e6e14967f94ae81e43e212a269

  • SHA1

    430cbbe633775c0615e25cbff99bcc8cd8bc9f9c

  • SHA256

    e4afe033561fe5bc752c5df8698c103ad815b61162aabe66c2d1c4df179662a6

  • SHA512

    634c8284743a0efc992ab130df7129ff7549f09cb92935c86b0af481dfbdc47df0e627d3c530a0491428700d0dc92723651223517b4732b8b08930cf4535aa7b

  • SSDEEP

    3072:doojKRmr9PZS/+Xrl1VrHQW6CURgeXd0z7bLvgQMFLesUDjzCKCMlA4tIrZJVrSW:Nr9PLTQDNYr5XO6A4tIrRSc1

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-31_982205e6e14967f94ae81e43e212a269_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\Beni Oku.txt
        3⤵
          PID:1004

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Building Blocks\1033\Beni Oku.txt

      Filesize

      543B

      MD5

      332815cac9d93b86adaf6104ca6d9687

      SHA1

      6f6c5f5e994ae85890627c7893a53423d0b74c95

      SHA256

      49af03004f75fc1a1fd95415f7d21ed05ff6b90d786bdcca0256289dbf10a263

      SHA512

      c991517e7c58c430e0488b6325584164086aaa1478c3cce4dffa7fca8fb09e9113a3b33948e99364cee02752b90a899c289f2615572e8d6ab9834c0a8fe14d27

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      198KB

      MD5

      982205e6e14967f94ae81e43e212a269

      SHA1

      430cbbe633775c0615e25cbff99bcc8cd8bc9f9c

      SHA256

      e4afe033561fe5bc752c5df8698c103ad815b61162aabe66c2d1c4df179662a6

      SHA512

      634c8284743a0efc992ab130df7129ff7549f09cb92935c86b0af481dfbdc47df0e627d3c530a0491428700d0dc92723651223517b4732b8b08930cf4535aa7b

    • memory/864-14-0x00007FF998060000-0x00007FF998B21000-memory.dmp

      Filesize

      10.8MB

    • memory/864-49-0x00007FF998060000-0x00007FF998B21000-memory.dmp

      Filesize

      10.8MB

    • memory/1296-0-0x00007FF998063000-0x00007FF998065000-memory.dmp

      Filesize

      8KB

    • memory/1296-1-0x0000000000D40000-0x0000000000D78000-memory.dmp

      Filesize

      224KB