Analysis
-
max time kernel
10s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe
Resource
win10v20210410
General
-
Target
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe
-
Size
240KB
-
MD5
7bf2b57f2a205768755c07f238fb32cc
-
SHA1
45356a9dd616ed7161a3b9192e2f318d0ab5ad10
-
SHA256
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
-
SHA512
91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@WanaDecryptor@.bmp" b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exepid process 3912 b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe 3912 b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe"C:\Users\Admin\AppData\Local\Temp\b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25.sample.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx