Analysis

  • max time kernel
    2s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 15:29

General

  • Target

    2025-01-28_b21d7c63eabea7dac241fa813a69f366_destroyer_wannacry.exe

  • Size

    26KB

  • MD5

    b21d7c63eabea7dac241fa813a69f366

  • SHA1

    317eec1d89064a962f43ae5bd871bbf7294a042c

  • SHA256

    6837a61a80160c03f656789ae3fe7bdf66b9dd06511b24bf3d9abc5d1d1f6099

  • SHA512

    c56b1e225ac880e4e8290142e39c94974d05ba2295933d58e1eeffea45a283ee808338b7c5b53f370b71ea931c3d791987e0b84a358d8b115c3714e9622f2b23

  • SSDEEP

    384:CtWZPzzxAm1vA50rRxJYilMDwXd/clMOy5o915mb+82vE:H7zxAmMoVYTedFho9ma82M

Malware Config

Signatures

  • Chaos

    Ransomware family first seen in June 2021.

  • Chaos Ransomware 2 IoCs
  • Chaos family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-28_b21d7c63eabea7dac241fa813a69f366_destroyer_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-28_b21d7c63eabea7dac241fa813a69f366_destroyer_wannacry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      "C:\Users\Admin\AppData\Roaming\svchost.exe"
      2⤵
        PID:3896
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C vssadmin delete shadows /all /quiet & wmic shadowcopy delete
          3⤵
            PID:3584
            • C:\Windows\system32\vssadmin.exe
              vssadmin delete shadows /all /quiet
              4⤵
              • Interacts with shadow copies
              PID:5044
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic shadowcopy delete
              4⤵
                PID:4860
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
              3⤵
                PID:3668
                • C:\Windows\system32\bcdedit.exe
                  bcdedit /set {default} bootstatuspolicy ignoreallfailures
                  4⤵
                  • Modifies boot configuration data using bcdedit
                  PID:1872
                • C:\Windows\system32\bcdedit.exe
                  bcdedit /set {default} recoveryenabled no
                  4⤵
                  • Modifies boot configuration data using bcdedit
                  PID:4812
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C wbadmin delete catalog -quiet
                3⤵
                  PID:3960
                  • C:\Windows\system32\wbadmin.exe
                    wbadmin delete catalog -quiet
                    4⤵
                    • Deletes backup catalog
                    PID:4544
                • C:\Windows\system32\NOTEPAD.EXE
                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt
                  3⤵
                  • Opens file in notepad (likely ransom note)
                  PID:2896
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
                PID:5088
              • C:\Windows\system32\wbengine.exe
                "C:\Windows\system32\wbengine.exe"
                1⤵
                  PID:4772
                • C:\Windows\System32\vdsldr.exe
                  C:\Windows\System32\vdsldr.exe -Embedding
                  1⤵
                    PID:316
                  • C:\Windows\System32\vds.exe
                    C:\Windows\System32\vds.exe
                    1⤵
                      PID:3740

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\3D Objects\read_it.txt

                      Filesize

                      18B

                      MD5

                      f3b9becc19cabde43912370a1dcb35ed

                      SHA1

                      69fd5a88222aca9970b17eb8bc646704495c6dce

                      SHA256

                      e45bba3f4c70702ef273e8773afb41338b2976f1dbf85f513b93c3255f38c41c

                      SHA512

                      96e432259dbbbca5aacb82afa9f94f894ce8ef8c2638c814230bfe69ff72bc70a54ae9a67fe1b19834594123d94c41491e6de338c488fca68a89db4a2b1d1634

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\2025-01-28_b21d7c63eabea7dac241fa813a69f366_destroyer_wannacry.exe.log

                      Filesize

                      1KB

                      MD5

                      baf55b95da4a601229647f25dad12878

                      SHA1

                      abc16954ebfd213733c4493fc1910164d825cac8

                      SHA256

                      ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                      SHA512

                      24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                    • C:\Users\Admin\AppData\Roaming\svchost.exe

                      Filesize

                      26KB

                      MD5

                      b21d7c63eabea7dac241fa813a69f366

                      SHA1

                      317eec1d89064a962f43ae5bd871bbf7294a042c

                      SHA256

                      6837a61a80160c03f656789ae3fe7bdf66b9dd06511b24bf3d9abc5d1d1f6099

                      SHA512

                      c56b1e225ac880e4e8290142e39c94974d05ba2295933d58e1eeffea45a283ee808338b7c5b53f370b71ea931c3d791987e0b84a358d8b115c3714e9622f2b23

                    • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Magnify.lnk

                      Filesize

                      1B

                      MD5

                      d1457b72c3fb323a2671125aef3eab5d

                      SHA1

                      5bab61eb53176449e25c2c82f172b82cb13ffb9d

                      SHA256

                      8a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1

                      SHA512

                      ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0

                    • memory/1676-1-0x00000000008D0000-0x00000000008DC000-memory.dmp

                      Filesize

                      48KB

                    • memory/1676-0-0x00007FFC7BC93000-0x00007FFC7BC95000-memory.dmp

                      Filesize

                      8KB

                    • memory/1676-2-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1676-16-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3896-15-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3896-1273-0x00007FFC7BC90000-0x00007FFC7C751000-memory.dmp

                      Filesize

                      10.8MB