Analysis
-
max time kernel
1s -
max time network
144s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-01-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win11-20231215-en
General
-
Target
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
-
Size
3.4MB
-
MD5
84c82835a5d21bbcf75a61706d8ab549
-
SHA1
5ff465afaabcbf0150d1a3ab2c2e74f3a4426467
-
SHA256
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
-
SHA512
90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
SSDEEP
98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\@[email protected]
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
taskdl.exepid process 2336 taskdl.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.execmd.exedescription pid process target process PID 2376 wrote to memory of 5104 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe attrib.exe PID 2376 wrote to memory of 5104 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe attrib.exe PID 2376 wrote to memory of 5104 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe attrib.exe PID 2376 wrote to memory of 1980 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe icacls.exe PID 2376 wrote to memory of 1980 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe icacls.exe PID 2376 wrote to memory of 1980 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe icacls.exe PID 2376 wrote to memory of 2336 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe taskdl.exe PID 2376 wrote to memory of 2336 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe taskdl.exe PID 2376 wrote to memory of 2336 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe taskdl.exe PID 2376 wrote to memory of 2772 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe cmd.exe PID 2376 wrote to memory of 2772 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe cmd.exe PID 2376 wrote to memory of 2772 2376 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe cmd.exe PID 2772 wrote to memory of 544 2772 cmd.exe cscript.exe PID 2772 wrote to memory of 544 2772 cmd.exe cscript.exe PID 2772 wrote to memory of 544 2772 cmd.exe cscript.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 2976 attrib.exe 5104 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\AppData\Local\Temp\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 210221704207605.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:2976 -
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:1980 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2708
-
C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵PID:400
-
C:\Windows\SysWOW64\cmd.exePID:3228
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "iodedxjfc775" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f2⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1536
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3836
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:2064
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:2408
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:3208
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:4880
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1808
-
C:\Users\Admin\AppData\Local\Temp\taskse.exePID:3784
-
C:\Users\Admin\AppData\Local\Temp\taskdl.exetaskdl.exe2⤵PID:1980
-
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs1⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]PID:1808
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet2⤵PID:1576
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵PID:4504
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:4772
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "iodedxjfc775" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f1⤵
- Modifies registry key
PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD56baa3ade6ed4868f9a24972b0eb06667
SHA104f0075992b09b44d5f70daf49612c0762df04f7
SHA2564e807587ad094bc0ca4b4207d301dbfb726cf2755243efdbd1ef826c06f49b9b
SHA512133ad85a2a1de6fda3a9710896af41b0151d767090558d6515e132b865e62bf169dce7bab9a9fdb0e5e2f033a559446e7aa90ee2ccea0f03638a9ec7d08e0b67
-
Filesize
340B
MD53867f2ec82a7d77c9ffefb1aac8b7903
SHA106fccf19b9c498b5afa2b35da00e3ab28d56f785
SHA2564e25c23aa5babc853889d3e1e79bb01ca7650837b250314a8d50f2e2c4b6730f
SHA512b413994e5b9f0ecb956055c7befff14845b56bb658fd8280d3213fdfa175ff76bc56e082174f2475fdf2d1f9eff618ebfd80ee2b67c091eaf1fd9c94697da5aa
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize933B
MD57e6b6da7c61fcb66f3f30166871def5b
SHA100f699cf9bbc0308f6e101283eca15a7c566d4f9
SHA2564a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e
SHA512e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize229KB
MD510dff2d67c336483964af1069e74c6d5
SHA1d1660d65be9be29e7cd77029b96c1c5604c4a199
SHA25636e51f9fdc8f5f2b2a926202044f124a9eb7ba264a56e12dd4ee119d4c656f16
SHA512f727ead012237820872e3aa5c46b2cf37f47e9f308e3667639fb3ee89e0176c2b61356efe9f245adbe2dc80b1623e824b4edf6dacee1fdc21379fb9803e01368
-
C:\Users\Admin\AppData\Local\Temp\@[email protected]
Filesize1KB
MD55925c5d4be5e531c99e1bec0b341ce8f
SHA16d3fb367cdffa38573a6692fa0d7614c6ed9a9ce
SHA2560909c5b755abc6b4bdbe31912eab91a42c340fac73c8d753f5f8ad57ec7b3758
SHA51276e02045ed809d8e99d2a17623e1caf449cd3e4a983ff595432c6f9fae5c6b7b5e8792c60c0ba71e32b66d61e4e1cff7f172cdf90ae77849513ce7031dd37963
-
Filesize
270KB
MD553b0f73442fdfd5450cc01e3720792ef
SHA1f206fbced0ca7febe1658c8fc4c68520ef251e2e
SHA256420c53e95d720b17ccb457dc7179e52f04cafabb89eaea041749d6eb4f9ed666
SHA51237468fcf7c2025707e02de9f52a772820b077f348f788931a65ab215b39a7636eed9b7eed3193752915c8e5432f16dbb0a25d7aa4e4572ade4ab27abe9d5a205
-
Filesize
292KB
MD5bfe40852f0e4cf143e051f1bc8b37927
SHA1f58c26d17f08eac91fa01f93e10945d06d699bba
SHA2569864a8f8629aa53beaf9fdf98e8f057541b24b302d9350fa10ff7c5a50b0fe15
SHA5125d3d82f4dd5db22f1fb86f7fd5e0128e6ccdd7561cb8da9151316e3095edcf1d9d1ef3c616a066eda6ca877641a47eb43b881e17efb4256bc599b9cb8b32df8d
-
Filesize
443KB
MD503668fc9c32649bd164fc22d2c6b036f
SHA1713db65af8dacf438555f570b8ed8c8edb511646
SHA2560e18992e65fd5b8ada086f5916fe0a7e9d80ecac8b69ccd7a01d333db4bc893b
SHA51243e466e9a93405a2a740c1954062bc33bb57f8f445e9594412fe2957aa7b37fbc241da894fd254d21660df28dcadfe55a0b9d80cb4a6f5df32731f3b2073d8ff
-
Filesize
291KB
MD5f0ad3fb29e53d68605ecef1547b7864a
SHA10d335a51b9d9f8bdda7e5f80d77222207a15dfa8
SHA25637631fddec5d86e98f407a9b827523c143c27aecf8de5c943fd09e58a0f6d428
SHA5124e458fd5acd186046dbec0a84331667dbc0ddb4882e25052fe9dbf7836ab80b77735a797b39d2cc342044ee4208f922ac7737edb60a43399794182db831b8d49
-
Filesize
418KB
MD56e5b902e415faf0dae4913e0849092d7
SHA1197a8606c6729a8703d6c96773af20a88add2d54
SHA2566d741a721ecf0c476f12639abddfa06e163d3d7220ce9390ccae13814f9fe1df
SHA512f703c5dd88fbad1dfad0b0e8428e354a158d1af1c9d3fee53920fba9e3234761a500f9a73a57dedcf3ac7362167f1debbbe325f38f902cb248472a887c1dfd91
-
Filesize
608KB
MD5cf8f53d88ca6e7607c8794ebdcd0295a
SHA1708149dbbdc1b41329f0eeed8a78ed1fb846f01c
SHA256a5e5b6bbd9ddddcd074fa5967c49596de32faf113da6125c9e63016baebd177f
SHA512898a6705879029e842b4e8a198fee7dd9543b82f4645ae6a445b5a2ff81a565b065a03af702492c6e7fa665f9b9ec151cfeaf0969ff240549982687bcf076ad7
-
Filesize
223KB
MD59758daf6afdd877a6e5e0352c5003ac2
SHA1dcce1cb504f1be7a412e379973404f4a2e03d838
SHA256009bc5a091e6804cd028e9cd7a71764547c774272af09782ff332c02b36c4046
SHA5121f08e155d98c429da74e5de86fb140f91630f4bed5a4cab221f88c905d105df300517c3fbb779e4b2db6056e7b158ab2d4db2c5319b6850abad076fb1c730273
-
Filesize
385KB
MD542a9a6460e953da174daee2afb59bad8
SHA1e5558fcdb36d5aa70a8985f67662792b6512a117
SHA256fdecaf52244bbee363646372e9515c33ea329048ba86d2a59cc32d460f3015c5
SHA512c09c93c3f38e7e9bee7c42da08dee391c3c16d9c23a455529e4b450a2523c0cb18ad9ed8a38ca6e7800a0b507825e227ea752179339ea2af1d8d197af0a9cfb9
-
Filesize
90KB
MD578581e243e2b41b17452da8d0b5b2a48
SHA1eaefb59c31cf07e60a98af48c5348759586a61bb
SHA256f28caebe9bc6aa5a72635acb4f0e24500494e306d8e8b2279e7930981281683f
SHA512332098113ce3f75cb20dc6e09f0d7ba03f13f5e26512d9f3bee3042c51fbb01a5e4426c5e9a5308f7f805b084efc94c28fc9426ce73ab8dfee16ab39b3efe02a
-
Filesize
267KB
MD5a818cb2e14aac0c63f41368865c2f5ac
SHA1e2350e783f77f0e328617cd9d9a119d6404b2982
SHA2566943df3c2dd29e38d0c7dbffe64339950e0333d7a18495484ad90ba6013da050
SHA512c04118139cc82b66144cafe42bf456cb2f2bcc2f2d6a79f971b20b199eadea661774967ea9849be9824f18d18b913be7ecd9861c8e2a543a8d25757329449526
-
Filesize
320KB
MD5a47592015c1dab7d8f3e0df155d33aba
SHA10446ad5efb6ef4937afdcac285102caf9333756d
SHA256d37e70207820be259f0f4f04b485459b1de9dd7d8ce7669d0694d1525e8ec2df
SHA51218d0d335e4648183031ab8c93d77eeda334411404d2a9e65ecfad6b53c980da5c1138e84f44fb86c08951c3594302e4f9654bf7a91603cb12229e7f278ebaeed
-
Filesize
328KB
MD57089be8d5709c2ec8430dcde31ae4ae8
SHA15c3251c59c373df88958b0a38ad8dc7bde6f3562
SHA2563f51dbb22aeb07bdd1b6062b6f3c5384c0633e6d987fc8e41a42d48a969642d3
SHA512f8fe2e359131ce9683b6aded402df211f0fd543a31984e18cf8a66713edf84634e41d68ff067fd2d07308bef64448cc058117f517a5d3c7853554b9c31a06ad4
-
Filesize
371KB
MD56fbd817b8b805a9ebe1e7ec66aee5453
SHA1f74ff309ce8c55c7c0659e60280d23475f7a860f
SHA2566000538345a551cb4ca3c37447332988193b0bef927072c47c7ea508bc5d3dab
SHA5129825513c0417f1c2027679ec969bff39c0dcdacaf01e88b77c61669845813d898743e7da828a714800e7fc79a0a56540d21a784b1b6722262eb9e22134864ec1
-
Filesize
105KB
MD5fb072e9f69afdb57179f59b512f828a4
SHA1fe71b70173e46ee4e3796db9139f77dc32d2f846
SHA25666d653397cbb2dbb397eb8421218e2c126b359a3b0decc0f31e297df099e1383
SHA5129d157fece0dc18afe30097d9c4178ae147cc9d465a6f1d35778e1bff1efca4734dd096e95d35faea32da8d8b4560382338ba9c6c40f29047f1cc0954b27c64f8
-
Filesize
92KB
MD52b8fff41748e4a75789f7d8d475856fe
SHA1b175af3891b415bd34815cfb70055d4423accbbd
SHA256ee707577ff5e2563464210718c7b238c62f35f29394bf94ec3a3a96729be1fba
SHA512b528faab4cad0870747e7ee2be289637caad910a760661e8f68ef8a40fc315c7e38617d85dbff14cf3feb823b3722ead18540eab0baf7d52db25bcc1b777db38
-
Filesize
780B
MD5db6f74bf0a1157fb07ab05b4629e4947
SHA1a268a65174cda5ae22209cc73e743bb17d15e288
SHA25664473610b0ccd1dc136a9646126b29f1d22dbe4dc66f17a9a2022d143ae926cd
SHA51293f3ab3b9efcc689dd831663229dcd1611912c485976fe0aa5d01ffeb01b8f429b06393ac628ff9c6c1951a3e18e01799cb35dbe16d5a60c512b56365871cb1a
-
Filesize
780B
MD593f33b83f1f263e2419006d6026e7bc1
SHA11a4b36c56430a56af2e0ecabd754bf00067ce488
SHA256ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4
SHA51245bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac
-
Filesize
219B
MD582a1fc4089755cb0b5a498ffdd52f20f
SHA10a8c0da8ef0354f37241e2901cf82ec9ce6474aa
SHA2567fbdc49f4b4ba21949eca0b16c534b4882da97e94e5ca131cec1629e60439dfa
SHA5121573a0c7333accef2695efefe1b57cba8f8d66a0061c24420ee0a183343a9a319995267d306ee85084c95580f9855bcdf9dee559b28a200b27fc3cc353315e78
-
Filesize
46KB
MD595673b0f968c0f55b32204361940d184
SHA181e427d15a1a826b93e91c3d2fa65221c8ca9cff
SHA25640b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd
SHA5127601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92
-
Filesize
53KB
MD50252d45ca21c8e43c9742285c48e91ad
SHA15c14551d2736eef3a1c1970cc492206e531703c1
SHA256845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a
SHA5121bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
20KB
MD54fef5e34143e646dbf9907c4374276f5
SHA147a9ad4125b6bd7c55e4e7da251e23f089407b8f
SHA2564a468603fdcb7a2eb5770705898cf9ef37aade532a7964642ecd705a74794b79
SHA5124550dd1787deb353ebd28363dd2cdccca861f6a5d9358120fa6aa23baa478b2a9eb43cef5e3f6426f708a0753491710ac05483fac4a046c26bec4234122434d5
-
Filesize
20KB
MD58495400f199ac77853c53b5a3f278f3e
SHA1be5d6279874da315e3080b06083757aad9b32c23
SHA2562ca2d550e603d74dedda03156023135b38da3630cb014e3d00b1263358c5f00d
SHA5120669c524a295a049fa4629b26f89788b2a74e1840bcdc50e093a0bd40830dd1279c9597937301c0072db6ece70adee4ace67c3c8a4fb2db6deafd8f1e887abe4
-
C:\Users\Default\Desktop\@[email protected]
Filesize332KB
MD56dfa433f7a3150968446284b9ea0ef12
SHA1ba6a941f39b2a095146c7fe43d1c1b41a4cc2a10
SHA256e9fbfbd4068de6e0aa61f7b94f172bc00e072fd8d43ba3150d7fa25edb0998c3
SHA512387bd9aa291c0dbab29d17dbdcccf051b165998187578c0c2ec758eba32a61bbae9aa496d3b51e0c57e62b2d83b41110ed79af78f78dcc74dcc658bfbf72be9c