Analysis

  • max time kernel
    121s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-05-2021 02:01

General

  • Target

    bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe

  • Size

    3.6MB

  • MD5

    1b050ebe031393a42ee9538199419589

  • SHA1

    bde576ee3b9b90cfb261d4e13677dc24d526e7f2

  • SHA256

    bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26

  • SHA512

    284396f7da48830750342eeda2439428152946c727a1c4da4af203e9006e570e7d8f11906b636f3cbf5af790a26a54cb6d7d44583bd0e89fe6b878cd5afb9409

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe
    "C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe"
    1⤵
    • Drops file in Windows directory
    PID:1208
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1744
  • C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe
    C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1096
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1176
  • C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe
    C:\Users\Admin\AppData\Local\Temp\bbf798ec1223e2b20f0d646682aeb90e02f1f7b1b9b7ad5d430843f38a7e8f26.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe
    MD5

    0be1393c5d427ee17e120e026b79f144

    SHA1

    6b6b72479cd2cb26b664d5c7e76d5f103b4eb8ae

    SHA256

    61bcd56d40e68126c3e24b5e067730ebead13fcc1ae0b344a63fc42624102c3a

    SHA512

    179cfdb9bb52b6ed977cb3e992a0b2d2acc7ee37ce560f7e68c9358e2c6cbbb4d45f35751a940fb86da7906a7fc132d50ffee0d6672a1d592a0c74bc0f7d3182

  • memory/1176-62-0x0000000000000000-mapping.dmp
  • memory/1208-59-0x0000000075561000-0x0000000075563000-memory.dmp
    Filesize

    8KB