Analysis

  • max time kernel
    157s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-06-2022 12:46

General

  • Target

    a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167.exe

  • Size

    3.6MB

  • MD5

    55816e3a47bd0ee742f41153dfcd76ad

  • SHA1

    78dbe08344794c928188a7421c52720844f28b13

  • SHA256

    a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167

  • SHA512

    5b3a447a0ae0732bee048a5c03d5656ec6fc8b0a13b6921e537bbb212fe83ce65d518cd1b114648d338445b3ceb3afcb9479b723c79ff292ecd46c0d88019aa8

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

    suricata: ET MALWARE Known Sinkhole Response Kryptos Logic

  • suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

    suricata: ET MALWARE W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1

  • Contacts a large (3219) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167.exe
    "C:\Users\Admin\AppData\Local\Temp\a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167.exe"
    1⤵
    • Drops file in Windows directory
    PID:480
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2116
  • C:\Users\Admin\AppData\Local\Temp\a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167.exe
    C:\Users\Admin\AppData\Local\Temp\a52e904523d45013ebb109d088626731400ddd031d25f60ee0c61c19e5c5a167.exe -m security
    1⤵
    • Modifies data under HKEY_USERS
    PID:4084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    466b6d86ce08666e933aed703196033f

    SHA1

    683b2dddcd629ec1534bcb411912a5285fb5b989

    SHA256

    982a1485dcd70fbdc0c34f81d1b4a798cc0aca74495b505abfe277a65ef5d783

    SHA512

    d979b4887dbd49aee24e11a20584da9be4d6bdc5eeb57cff9edef1d85916b1936cfe513ac4317c00546497c0b23cd52d664ea6a9752b3ba5e98e9af8d7daf750