General
-
Target
2025-02-12_5464b1193f7979e121da4b48323a263f_wannacry
-
Size
132KB
-
Sample
250212-23qarazkan
-
MD5
5464b1193f7979e121da4b48323a263f
-
SHA1
4206ba97e8de89d47cdab4441e10829d9ae0f69e
-
SHA256
37e67d7687cbab77fd57096bbbd31ec2491f293a4e39d04ee0247109030a611a
-
SHA512
1b5f02952d985360f7a173501fba4900712b1381ef3ddff48891c5b1ba44f7d25690670da26865e576952a5c0f656d4803444bd1390eafe903817f41ef48e1d6
-
SSDEEP
1536:I3kIowImQr9i9L8PHzbSIS0bvB2GsMTUhdo0Bon8:I3kBmQr9i9LEbDvB2GsMTUhdo0Bo
Behavioral task
behavioral1
Sample
2025-02-12_5464b1193f7979e121da4b48323a263f_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-12_5464b1193f7979e121da4b48323a263f_wannacry.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
C:\Users\Admin\Desktop\read_it.txt
chaos
196uiHAt1nC4Gch5SDLV14DMfZg8DxDAui
Targets
-
-
Target
2025-02-12_5464b1193f7979e121da4b48323a263f_wannacry
-
Size
132KB
-
MD5
5464b1193f7979e121da4b48323a263f
-
SHA1
4206ba97e8de89d47cdab4441e10829d9ae0f69e
-
SHA256
37e67d7687cbab77fd57096bbbd31ec2491f293a4e39d04ee0247109030a611a
-
SHA512
1b5f02952d985360f7a173501fba4900712b1381ef3ddff48891c5b1ba44f7d25690670da26865e576952a5c0f656d4803444bd1390eafe903817f41ef48e1d6
-
SSDEEP
1536:I3kIowImQr9i9L8PHzbSIS0bvB2GsMTUhdo0Bon8:I3kBmQr9i9LEbDvB2GsMTUhdo0Bo
-
Chaos Ransomware
-
Chaos family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1