Resubmissions
22-08-2023 10:12
230822-l8yajsdb6v 1022-08-2023 10:00
230822-l12yrsda9t 1007-08-2023 18:52
230807-xh3ywsad2x 1007-08-2023 15:21
230807-srm7kshb2w 1006-08-2023 21:06
230806-zxvbeacc93 1006-08-2023 17:17
230806-vt4y8abc42 1030-07-2023 17:41
230730-v9h2paae38 10Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
06-08-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
RANSOMWARE-WANNACRY-2.0-master.zip
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
RANSOMWARE-WANNACRY-2.0-master/LICENSE
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
RANSOMWARE-WANNACRY-2.0-master/README.md
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
RANSOMWARE-WANNACRY-2.0-master/Ransomware.WannaCry.zip
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20230712-en
General
-
Target
RANSOMWARE-WANNACRY-2.0-master/README.md
-
Size
70B
-
MD5
39148bc21924851d9082b687dc69e2dc
-
SHA1
5d1e5490476227aa8877b87aad184031e19dc33a
-
SHA256
76a94c98df32a1d37cc7f1e2b86bdc524eda3fedcdb35e57de0dd56bd976142f
-
SHA512
2415bb9de017c086abf8315e4288a04d5eb6048af2637e75843778f24de6834154b68365794b6cbc09ef5da0fe96d5bfce20227bf3656d23b7f148fb60988041
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2308 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2308 AcroRd32.exe 2308 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2508 wrote to memory of 1424 2508 cmd.exe rundll32.exe PID 2508 wrote to memory of 1424 2508 cmd.exe rundll32.exe PID 2508 wrote to memory of 1424 2508 cmd.exe rundll32.exe PID 1424 wrote to memory of 2308 1424 rundll32.exe AcroRd32.exe PID 1424 wrote to memory of 2308 1424 rundll32.exe AcroRd32.exe PID 1424 wrote to memory of 2308 1424 rundll32.exe AcroRd32.exe PID 1424 wrote to memory of 2308 1424 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RANSOMWARE-WANNACRY-2.0-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52690853c98d274026b3ec2aa2024855a
SHA1b49d66ead53d4e4a95dabb446969053d9fbee242
SHA256ae8d504ce210479809760b91ae46f92f7b1eed6951db01a11b1212add187841c
SHA512101298cf5461f507f7903466fad9ebf0f664e9049f74184106d33b7eb5d16ded2de8049107882a23e9039dc5466c00a793a2849c47d97343e3fcba1e9dbb8600