Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-06-2023 08:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
WannaCry.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
WannaCry.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
WannaCry.exe
-
Size
2.9MB
-
MD5
4980d38eeac9f666c67d40406d8ef615
-
SHA1
a3f38d0dec13df5f805b5acde112c2acac73ba08
-
SHA256
767d2f8c73f90a9589c3be231d94e14212f0348f8a707eccf312f5b36972e2c4
-
SHA512
c2e1ce3ac3bcb6ed0fa771e338839e436317cf718cd6a1b727673cb1f102e0c77defc9771f77191163752b7676a9080d77b93f7db73f282071a4a5a5dc712d4f
-
SSDEEP
6144:k/jhHGXR/BsheZM5wnH2m9pD6UgmryJOk55ndwz7AYjK8RTI5JN4jnpK:k/0XHsheSAH2GD3uOAwP5ZI5z4jpK
Score
5/10
Malware Config
Signatures
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
WannaCry.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Control Panel\Desktop\Wallpaper = ".\\wallpaper\\WanaDecryptor.bmp" WannaCry.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 292 1920 WerFault.exe WannaCry.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WannaCry.exedescription pid process target process PID 1920 wrote to memory of 292 1920 WannaCry.exe WerFault.exe PID 1920 wrote to memory of 292 1920 WannaCry.exe WerFault.exe PID 1920 wrote to memory of 292 1920 WannaCry.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WannaCry.exe"C:\Users\Admin\AppData\Local\Temp\WannaCry.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1920 -s 5922⤵
- Program crash