Resubmissions

22-08-2023 10:12

230822-l8yajsdb6v 10

22-08-2023 10:00

230822-l12yrsda9t 10

07-08-2023 18:52

230807-xh3ywsad2x 10

07-08-2023 15:21

230807-srm7kshb2w 10

06-08-2023 21:06

230806-zxvbeacc93 10

06-08-2023 17:17

230806-vt4y8abc42 10

30-07-2023 17:41

230730-v9h2paae38 10

Analysis

  • max time kernel
    1s
  • max time network
    6s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 18:52

General

  • Target

    ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe

  • Size

    3.4MB

  • MD5

    84c82835a5d21bbcf75a61706d8ab549

  • SHA1

    5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

  • SHA256

    ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

  • SHA512

    90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

  • SSDEEP

    98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Modifies file permissions 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
    "C:\Users\Admin\AppData\Local\Temp\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h .
      2⤵
      • Views/modifies file attributes
      PID:2724
    • C:\Windows\SysWOW64\icacls.exe
      icacls . /grant Everyone:F /T /C /Q
      2⤵
      • Modifies file permissions
      PID:1424

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b.wnry
    Filesize

    640KB

    MD5

    7495993f64e5a069adef501c635a834b

    SHA1

    58018b8df743fb2e93a415769db343abe133d5b6

    SHA256

    0c83e21ca562459768993ffc1cc606d3aef94e3cbde4f52152dfbfe25328dd76

    SHA512

    ef38a963bc057c809607f0b5b8cc387e296b251104a77a8e0e5434af84b73ed14f9149e16012c4ada0e63d6e208983cc826c772a16f2030fda2535ef86eb0a62

  • C:\Users\Admin\AppData\Local\Temp\msg\m_croatian.wnry
    Filesize

    38KB

    MD5

    17194003fa70ce477326ce2f6deeb270

    SHA1

    e325988f68d327743926ea317abb9882f347fa73

    SHA256

    3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171

    SHA512

    dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c

  • C:\Users\Admin\AppData\Local\Temp\msg\m_finnish.wnry
    Filesize

    37KB

    MD5

    35c2f97eea8819b1caebd23fee732d8f

    SHA1

    e354d1cc43d6a39d9732adea5d3b0f57284255d2

    SHA256

    1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

    SHA512

    908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

  • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
    Filesize

    20KB

    MD5

    4fef5e34143e646dbf9907c4374276f5

    SHA1

    47a9ad4125b6bd7c55e4e7da251e23f089407b8f

    SHA256

    4a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79

    SHA512

    4550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5

  • C:\Users\Admin\AppData\Local\Temp\taskse.exe
    Filesize

    20KB

    MD5

    8495400f199ac77853c53b5a3f278f3e

    SHA1

    be5d6279874da315e3080b06083757aad9b32c23

    SHA256

    2ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d

    SHA512

    0669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4

  • C:\Users\Admin\AppData\Local\Temp\u.wnry
    Filesize

    128KB

    MD5

    d277ee67f87a5e35caea412402a9e8c4

    SHA1

    2be00770834f6b0e441d95b1899a852fa7c7c9e8

    SHA256

    2f7a63e3b107298ce6402b24481ab4fd7b65ec46e8d8f63273c235512283b570

    SHA512

    b77168ec8938f6d427970d24c5fbc0c9e986e88ca33e509c161710d5da96b3e4314ff14e2ccfaf9dbea62dd655c1ad9cbb52608ffc43b4a447dbe676f2863882

  • memory/3552-174-0x0000000010000000-0x0000000010010000-memory.dmp
    Filesize

    64KB