Analysis
-
max time kernel
101s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:45
Behavioral task
behavioral1
Sample
2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe
-
Size
21KB
-
MD5
58276b228366e0cde9778a029cfec58a
-
SHA1
5377435ad3ec0740e90c2356d3c110260dbf3699
-
SHA256
e6ab5307c0bf08c44533f227dca42cef289beac8be32519d7ad7e03e8242a299
-
SHA512
653bd6cfbfc027821f163f2616d8627ed7d45d22b5334923df455906e19f8a2e845d8b67779427823304bb26741e3e7a82d6f1c7b1a54ca5b625989462a071c6
-
SSDEEP
384:q3MLWHn3kIxPScBp40jGoO7tJ9r91CzYvex:un3kIPBpXjgb9r9ikex
Malware Config
Signatures
-
Chaos
Ransomware family first seen in June 2021.
-
Chaos Ransomware 1 IoCs
resource yara_rule behavioral1/memory/1240-0-0x0000000000DA0000-0x0000000000DAC000-memory.dmp family_chaos -
Chaos family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.url 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\666.txt 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 34 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-805952410-2104024357-1716932545-1000\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000_Classes\Local Settings 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3420 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3420 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 93 PID 1240 wrote to memory of 3420 1240 2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_58276b228366e0cde9778a029cfec58a_destroyer_wannacry.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\666.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323B
MD5a6ec740677b633a714e98a97a66d4257
SHA17ba542c7c28fa98a1d84bde254f15ebaee651b78
SHA2568be96c982f21009ac3c1b1e96d7edbe1d462ea06667b6ffa10f40fab8888e8aa
SHA51298f7878b971a386404511c6a4f830a9cbc06d3e652552a69c571133cf83666e6dd155c4f9ecd9ec48cfeb49b1b12cfd7bb99aaf250d3ae35b1500746b3b2e030