Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2022 11:24

General

  • Target

    bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd.exe

  • Size

    3.6MB

  • MD5

    797d5d31c4e6c1accb2cbfddec8d66b9

  • SHA1

    dd5d04b01214dffdd75c575eefd342026c66a39d

  • SHA256

    bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd

  • SHA512

    ec26bd4120474d5a996a61c202befb548b5add6ac933986f6a992d050f00ccc3ebe49d19dc6946479da5605067df7b02f26f56e64855b029721f8789ae563e42

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9ZI:yDqPoBhz1aRxcSUDk36SAEdhvxWa9ZI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3198) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd.exe
    "C:\Users\Admin\AppData\Local\Temp\bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd.exe"
    1⤵
    • Drops file in Windows directory
    PID:3628
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2948
  • C:\Users\Admin\AppData\Local\Temp\bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd.exe
    C:\Users\Admin\AppData\Local\Temp\bbc4e7f739d9e7f38a343fc018bf5df9d654ed1a52dcaf00b6cc6cfdc8b18cbd.exe -m security
    1⤵
    • Modifies data under HKEY_USERS
    PID:3552

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Network Service Scanning

2
T1046

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe
    Filesize

    3.4MB

    MD5

    04af554ac498ed9e1353a8751bee6001

    SHA1

    077c84f26b471c1b0075490d89fdfc5de6f7b9af

    SHA256

    84b63d5d32bdbc8570257cbd5592c37626c1808a662ad70ae8972a75b4c61158

    SHA512

    9fb261d4f2cedd26934df9f15f9044c22beaecbe109646fd0604b615344a9be124598018844b18b4a6e279df2431dba0158c9cf566036ecbbd3681e6e97e866a