Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 01:48

General

  • Target

    6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe

  • Size

    3.6MB

  • MD5

    115ca848f0c3d5208efa8608721d3743

  • SHA1

    0b522d330814f13b954f58a77001e13b1b0d47e2

  • SHA256

    6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf

  • SHA512

    d246d65114b9de8d113c71c317df1947c0d5975d30811d8193d64985882998ddad698b49039549200ad1856a393465f78dfb48c57263609da9f4c4b3c1676173

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe"
    1⤵
    • Drops file in Windows directory
    PID:484
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1220
  • C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe
    C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1480
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:296
  • C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe
    C:\Users\Admin\AppData\Local\Temp\6c6a737e7257ef58331a83aa562d3b3d9cfc385c752bcb91dd0b216e82293faf.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe
    MD5

    4f924ae83006aeac7ba8af3f736cbf0c

    SHA1

    c11713220381694446a039dcf5e8b88bcde3113c

    SHA256

    c462425b6c3e7d1db101be6bb374af650902783a3b46d6cecda3488dedb4e621

    SHA512

    04fc3ed14be971e09c05da4ea16bf9df89621feb280fce020cc0c0b8497d2ee34f45f2001c5bfd1cd131bb157aaa5905a395c0f76dd7a2c78bb0d1ccaccfb1d0

  • memory/296-62-0x0000000000000000-mapping.dmp
  • memory/484-59-0x0000000075551000-0x0000000075553000-memory.dmp
    Filesize

    8KB