General
-
Target
2025-01-08_bccffd58776272eab71ecd9dde5a1735_destroyer_wannacry
-
Size
55KB
-
Sample
250108-e84zrsvjaw
-
MD5
bccffd58776272eab71ecd9dde5a1735
-
SHA1
d263ff45831ed75ac2eab51dfa543beadde51149
-
SHA256
1c6906f13a8f27d246689f648f9928afda7848f7176aa9845ab926647dfba486
-
SHA512
5c8bb405986fe1470df3d093629eba296db4ce7c802c32660fd7e7076935b2708ff0a656bc52f298de491b2caa633364c0470835fbb426fdbd1d95f4ecc61860
-
SSDEEP
1536:GNy0COWkCq9IcHX/NYMGvZFA3FD0TS/+:z03Cq9IcHFYDFAWuW
Behavioral task
behavioral1
Sample
2025-01-08_bccffd58776272eab71ecd9dde5a1735_destroyer_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-08_bccffd58776272eab71ecd9dde5a1735_destroyer_wannacry.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-08_bccffd58776272eab71ecd9dde5a1735_destroyer_wannacry
-
Size
55KB
-
MD5
bccffd58776272eab71ecd9dde5a1735
-
SHA1
d263ff45831ed75ac2eab51dfa543beadde51149
-
SHA256
1c6906f13a8f27d246689f648f9928afda7848f7176aa9845ab926647dfba486
-
SHA512
5c8bb405986fe1470df3d093629eba296db4ce7c802c32660fd7e7076935b2708ff0a656bc52f298de491b2caa633364c0470835fbb426fdbd1d95f4ecc61860
-
SSDEEP
1536:GNy0COWkCq9IcHX/NYMGvZFA3FD0TS/+:z03Cq9IcHFYDFAWuW
-
Chaos Ransomware
-
Chaos family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (178) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
3File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1