Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 15:58

General

  • Target

    3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08.exe

  • Size

    2.2MB

  • MD5

    959bc5f8599a393677fb1f97e98abdc0

  • SHA1

    3ae6020736489347c6ef4d0c187686b10b811c68

  • SHA256

    3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08

  • SHA512

    8e4d959ba8d31a0bd7df0012d60e147d50923d1aee8b1a1813f7207196469f025343c7a406fea1617b8c48d6a8e92309c93ce83e5515b56081b437f48bd6b2f9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08.exe
    "C:\Users\Admin\AppData\Local\Temp\3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      PID:392
  • C:\Users\Admin\AppData\Local\Temp\3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08.exe
    C:\Users\Admin\AppData\Local\Temp\3cc3123a3c419ec7c2a93c356c752baf42fd2e6e0400a1cd1da990be8eb65a08.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\tasksche.exe
    MD5

    b19741df9577126cd47234b7763b3689

    SHA1

    0df122b611ec0ab068f9d73fb30c24660a96c480

    SHA256

    48712ca6a9a8ba2b44b07b698474b0a51b899d97c307042f3e143d76d9acf29e

    SHA512

    d4182c66444ff212609ca7c68c6bdf765611ed9b8645d865785a171efb98633356df921598af824ccc49ef2970065503b1d86b7fba366335ced7e3309af0f90a

  • C:\Windows\tasksche.exe
    MD5

    b19741df9577126cd47234b7763b3689

    SHA1

    0df122b611ec0ab068f9d73fb30c24660a96c480

    SHA256

    48712ca6a9a8ba2b44b07b698474b0a51b899d97c307042f3e143d76d9acf29e

    SHA512

    d4182c66444ff212609ca7c68c6bdf765611ed9b8645d865785a171efb98633356df921598af824ccc49ef2970065503b1d86b7fba366335ced7e3309af0f90a

  • memory/392-61-0x0000000000000000-mapping.dmp
  • memory/1200-59-0x00000000768B1000-0x00000000768B3000-memory.dmp
    Filesize

    8KB