Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 19:43
Behavioral task
behavioral1
Sample
2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe
-
Size
23KB
-
MD5
ea6329f56de3d950ec51147a51e7e4f5
-
SHA1
ed291641efe32c980504a8f093f61d0c7a7e1c7c
-
SHA256
5a55e691732dc0601f0db09e4e3a9ea5faace1a6497455e5f9223dc913c4f264
-
SHA512
06bc1a910d08be17d9c14ce1d163d05c6f36a8ea8b9eeccb1f9f1ab9eacb68c3a833a1b68632f0b0cab8136b1b01fed960e1ff44e4e4c7727f0fdc1e6fc411cc
-
SSDEEP
384:u3Mg/bqo2Q+tZR11pXrjsWyrVaJPr91CA4yQieY:Mqo23tZRTpXrjsPVePr9F4AeY
Malware Config
Extracted
C:\Users\Admin\Documents\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 3 IoCs
resource yara_rule behavioral1/memory/2608-1-0x0000000000F80000-0x0000000000F8C000-memory.dmp family_chaos behavioral1/files/0x00090000000120fe-5.dat family_chaos behavioral1/memory/2904-7-0x00000000012F0000-0x00000000012FC000-memory.dmp family_chaos -
Chaos family
-
Renames multiple (230) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wastedLocker.url wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini wastedLocker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt wastedLocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 wastedLocker.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Documents\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Pictures\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Music\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Videos\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Documents\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Videos\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Music\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Desktop\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Searches\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Links\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini wastedLocker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini wastedLocker.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini wastedLocker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2112 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2904 wastedLocker.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 2904 wastedLocker.exe 2904 wastedLocker.exe 2904 wastedLocker.exe 2904 wastedLocker.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe Token: SeDebugPrivilege 2904 wastedLocker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2904 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 30 PID 2608 wrote to memory of 2904 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 30 PID 2608 wrote to memory of 2904 2608 2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe 30 PID 2904 wrote to memory of 2112 2904 wastedLocker.exe 32 PID 2904 wrote to memory of 2112 2904 wastedLocker.exe 32 PID 2904 wrote to memory of 2112 2904 wastedLocker.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_ea6329f56de3d950ec51147a51e7e4f5_destroyer_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\wastedLocker.exe"C:\Users\Admin\AppData\Roaming\wastedLocker.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Drops desktop.ini file(s)
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt3⤵
- Opens file in notepad (likely ransom note)
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5ea6329f56de3d950ec51147a51e7e4f5
SHA1ed291641efe32c980504a8f093f61d0c7a7e1c7c
SHA2565a55e691732dc0601f0db09e4e3a9ea5faace1a6497455e5f9223dc913c4f264
SHA51206bc1a910d08be17d9c14ce1d163d05c6f36a8ea8b9eeccb1f9f1ab9eacb68c3a833a1b68632f0b0cab8136b1b01fed960e1ff44e4e4c7727f0fdc1e6fc411cc
-
Filesize
641B
MD5afe539c365d5216c4e0cfedf82d5dbdd
SHA16890bcb79664331d4fb5ace0443b09094249904a
SHA256be50e1cdfae402763e8cce03be4029e01bd555c8d1f9d6dae54b8515d1dd1875
SHA512d8b01d8c08e5d5f894a671c2fc9a2786919dc3259f6d76ba395a9d545ca050e25aa00113675d61908d3d680605356b08f0ef13dbc427dd80cfc251575d6e357f