Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 00:29
Behavioral task
behavioral1
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
-
Size
1.6MB
-
MD5
4c0e5c4aa3eb66907cf32b7bd869dd8f
-
SHA1
2f97ad58991c727a897f4613e00d6b24a3300a85
-
SHA256
31aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
-
SHA512
56ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
SSDEEP
24576:T1I8mdFc9nPV3EouDm6BkNEnzC5CW78UV:OFc3C37zCyG
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 4 IoCs
resource yara_rule behavioral1/memory/1864-1-0x0000000000DC0000-0x0000000000F5E000-memory.dmp family_chaos behavioral1/files/0x0009000000012117-6.dat family_chaos behavioral1/memory/1780-8-0x00000000000A0000-0x000000000023E000-memory.dmp family_chaos behavioral1/files/0x0009000000012117-7.dat family_chaos -
Chaos family
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1864 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 1864 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe 1864 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-28_4c0e5c4aa3eb66907cf32b7bd869dd8f_wannacry.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"2⤵PID:1780
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54c0e5c4aa3eb66907cf32b7bd869dd8f
SHA12f97ad58991c727a897f4613e00d6b24a3300a85
SHA25631aa2f05a7cd0b81002336c0f0b5397415b9ee70250862f91215e2bc4bb571d8
SHA51256ddad28ad605fe95b4b8f1ea00a130db1e07e082391ce2a1c8336d4ee6f177d1d9806b8a5e200ddc2bf7319f9ba44f194cb48f52f3e9f2c689e7d9b502eea51
-
Filesize
71KB
MD5c99150fbc770e9cdbaf77a95d7b1221a
SHA1578261a2789ba0f7330dd66162867f0086c0254e
SHA256c26d0aad4c3f40f9c9f363f7f7d6720d4afbacb4c4a56370336c1611e477b5f7
SHA51299d36816e674d9d05cfa07c5b5d3afc1d46f0275b397251b1d10fa99f4a39ceba5d4cf478ed4c6c26786e83fab670c2f12233bb5baf3dd7a4ba27b936da351de