Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe
-
Size
2.2MB
-
MD5
4fda05b95c801ac8969f25df35577b2b
-
SHA1
a329db850275d368348603131a2953ebc36d5128
-
SHA256
35b4648bae8c821b09ccf42c52a0df6df7d1a15ba0634333ff7b587a91356583
-
SHA512
fe0bda3d97646f626249ec6b7fa27db4d5f987f1d2bd8c376a88f64fde601dc07cb315aec6f04f71220575a5d0cf282583dec9745b87ac8147ec25e6a1d3b327
-
SSDEEP
24576:QbLguriIfEcQdIVUacMNgef0QeQjG/D8kIqRYoAdNLK:QnpEKUacBVQej/1IN
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3243) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4864 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe File created C:\Windows\__tmp_rar_sfx_access_check_240634625 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4864 4100 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe 86 PID 4100 wrote to memory of 4864 4100 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe 86 PID 4100 wrote to memory of 4864 4100 2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exeC:\Users\Admin\AppData\Local\Temp\2023-08-25_4fda05b95c801ac8969f25df35577b2b_wannacry_JC.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52c48f29b22c250a7cb06153d8ebe2c38
SHA1f6b94a14f52f73d85a1954b2c3a7260c7aa851aa
SHA2564ce8192f06b492f184ba1232e37aa24fb974b1b8c99788efc80c61f4c50fdb5f
SHA512ef03ec9fd406e87fff789591d0d8dd45a034d9a236c381a4ffd91ab048b570cdf5f07af4975091a43b9678230693493e8e5053f0f8263f01b84b9ed37eec53e3
-
Filesize
2.0MB
MD52c48f29b22c250a7cb06153d8ebe2c38
SHA1f6b94a14f52f73d85a1954b2c3a7260c7aa851aa
SHA2564ce8192f06b492f184ba1232e37aa24fb974b1b8c99788efc80c61f4c50fdb5f
SHA512ef03ec9fd406e87fff789591d0d8dd45a034d9a236c381a4ffd91ab048b570cdf5f07af4975091a43b9678230693493e8e5053f0f8263f01b84b9ed37eec53e3