Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2022 04:27

General

  • Target

    e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919.exe

  • Size

    3.6MB

  • MD5

    0e0cdad186b2f9fc46c2b90762ccf69c

  • SHA1

    92771a67bbee538a74a8a54380e4f5c947a34991

  • SHA256

    e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919

  • SHA512

    a2bfdff6b0711843c9f1254ee2f29db2ad6475b7adb659e82c190d6204f7bb99c464e02a8f2c12be94e2643c5fb05798f013520658069c4244a1e07d500a1f18

  • SSDEEP

    49152:4naMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9:oaPoBhz1aRxcSUDk36SAEdhvxWa9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (1023) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919.exe
    "C:\Users\Admin\AppData\Local\Temp\e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919.exe"
    1⤵
    • Drops file in Windows directory
    PID:1064
  • C:\Users\Admin\AppData\Local\Temp\e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919.exe
    C:\Users\Admin\AppData\Local\Temp\e1c3744967613b18b6766b83f4b45be7f0ecfd0515573440b7d31430ccc92919.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:268

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

1
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1064-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmp
    Filesize

    8KB