Resubmissions
25/03/2025, 13:33
250325-qtmbyszqs8 1025/03/2025, 13:28
250325-qqrr9swyhv 1017/03/2025, 17:07
250317-vm97navxdt 1017/03/2025, 16:33
250317-t2ll6svsdv 1017/03/2025, 16:01
250317-tge9natxcw 10Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 13:28
Behavioral task
behavioral1
Sample
2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe
-
Size
25KB
-
MD5
fa88e518bfa73401b06f46344fd7f50f
-
SHA1
113b0427a8068ee83b5367ba400b8d900ef37d51
-
SHA256
436a860b7cf33a894940080dba3c9de6b3fc3a619f657915aecc22ea6c1de01f
-
SHA512
cc1a7cce176861b73dc38463090ad6b487284cd76aac91543be74ae7ac2ff469e05a1555145fb3529b9b33ca2cabb442478df5384ddf4fb036ca89f07694a0d4
-
SSDEEP
384:jYenjLLAwELM4Nuzb/3m3D4OIp91L5U1mbgyydxDGH:KwELMbXn941Ly+xDI
Malware Config
Extracted
C:\Users\Admin\read_it.txt
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
resource yara_rule behavioral2/memory/3512-1-0x00000000001B0000-0x00000000001BC000-memory.dmp family_chaos -
Chaos family
-
Renames multiple (201) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.url 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\read_it.txt 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1062200478-553497403-3857448183-1000\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000_Classes\Local Settings 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3416 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3416 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 94 PID 3512 wrote to memory of 3416 3512 2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-17_fa88e518bfa73401b06f46344fd7f50f_destroyer_wannacry.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\read_it.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5d1457b72c3fb323a2671125aef3eab5d
SHA15bab61eb53176449e25c2c82f172b82cb13ffb9d
SHA2568a8de823d5ed3e12746a62ef169bcf372be0ca44f0a1236abc35df05d96928e1
SHA512ca63c07ad35d8c9fb0c92d6146759b122d4ec5d3f67ebe2f30ddb69f9e6c9fd3bf31a5e408b08f1d4d9cd68120cced9e57f010bef3cde97653fed5470da7d1a0
-
Filesize
830B
MD555be6655caca2486576c70dad6187a71
SHA11123129f1c851d9adc949704f2517c89d8cd2ea3
SHA256c731f640e6d522d1a455727547aa14fc5e7e4a6a8efbeee1ffcc1b3c48c5a026
SHA5125d15427fbe370dca227b1b4be0ee4b4ad1648daa9cd70fe07d205760a4f7d42a3d50ff3c5d2460b7f8c429387f87fd683ca1f5e4c202c8a047e9ea49f3a217a1