Overview
overview
10Static
static
700FAEE82AB...AD.exe
windows7-x64
100B8E9BC319...20.exe
windows7-x64
100c9fa52ace...7a.exe
windows7-x64
715f7ea290d...8c.exe
windows7-x64
101DD70E8036...25.exe
windows7-x64
101E229029B2...DA.exe
windows7-x64
1021977fc851...61.exe
windows7-x64
1021e1bc4340...01.exe
windows7-x64
72272954a2c...5a.exe
windows7-x64
102C3542B5D9...85.exe
windows7-x64
73ac7f91e37...38.exe
windows7-x64
103c0fe521f6...16.exe
windows7-x64
1041c53e90f0...4a.exe
windows7-x64
10467c2b23b7...be.exe
windows7-x64
105b79b6a814...b0.exe
windows7-x64
10712affaa8b...1).exe
windows7-x64
172716d15ea...21.exe
windows7-x64
78b04af13b7...21.exe
windows7-x64
10Bit Paymer.exe
windows7-x64
10KeepCalm.exe
windows7-x64
1LockedIn.exe
windows7-x64
1Purge.exe
windows7-x64
1Scarab.exe
windows7-x64
10a631ad1b1a...4b.exe
windows7-x64
6a9053a3a52...bc.exe
windows7-x64
7b764629e1f...1c.exe
windows7-x64
10cf89f70633...5c.exe
windows7-x64
1e951e82867...50.exe
windows7-x64
1fa0c321e1a...d2.exe
windows7-x64
9fc184274ad...27.exe
windows7-x64
10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 15:13
Behavioral task
behavioral1
Sample
00FAEE82AB5B800CF6DBE97AFD39790B856AD1EC25DC7ED8F798ACA702BEE7AD.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0B8E9BC31964C9433BD5CC20E556CFD0590C3B17B0DB23CDC3AD0547683F3820.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
0c9fa52ace8019b43c91f4859ecddfde6705141b9283fef05c6c4c37a5c1777a.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
15f7ea290d832bc32ebf660690b42616264fc0be8969934c1f8d7e5a5d3cd18c.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
1DD70E803623D5311B71129976710B11A8942D206A5D8D86CDF8417255F15725.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1E229029B2D3FF00EDDE061B1AAF470EE437FA8196D97FAD2C2C6C9EDE5B44DA.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
21977fc851dfbcd7c5edcc24ef56750065fcd01e5c9fa4f270424f186a83b061.exe
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
21e1bc4340221fbccee28d59333c20b20755e34e2f3391b90837172bd07fbf01.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
2272954a2c9f631b4f9c5f6d230287b0989ab3b512bb5f4a282214eadf42085a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
2C3542B5D9AB4EED2DD88CD74A02236A944AFD76E8717F65DCD544912229CA85.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
3ac7f91e37572c0d15de4de96ab4719531c30536409fda4acb3e0071ab726338.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
3c0fe521f6a9cfbfabc1f27a1a64dfc081a63aaaf2a6ce8cd831f6251ee85816.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
41c53e90f0861b068eaa512edff28a586128f808b437122399347bcb3774914a.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
467c2b23b785df7b45758143387e9cc5a588718ae0640b3f01b1c19679b011be.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
5b79b6a81407caf12cf1894346a15e40c4dc017a35105119db3b23c7bf91c7b0.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
712affaa8b84e8fb7d4e71feb6c1074185bc43b5a2f265fbfb248f7ed40a5489 (1).exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
72716d15ea7d118b8c99dbcb15114188abe468718c876ac52b0779161ef7e821.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
8b04af13b729b0634b1a3c83e5758f25aecb708480bf2e3df524e889b305c621.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
Bit Paymer.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
KeepCalm.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
LockedIn.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Purge.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
Scarab.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
a631ad1b1a59001a5f594880c6ae3337bda98f8ce3bb46cd7a9de0b35cd2bc4b.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Resource
win7-20240220-en
Behavioral task
behavioral27
Sample
cf89f70633865aa06123062a7dc51f8158905afb4b00f6f3597de3edfba97c5c.exe
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
e951e82867a4f3af5a34b714571e9acf99cca794c4ed1895c9025a642d5d4350.exe
Resource
win7-20231129-en
Behavioral task
behavioral29
Sample
fa0c321e1aad571daaa3bf642ced8ab10931a05957ce9f17da49317816ca50c7_WthaiV9ed2.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
fc184274ad3908021e4c8ef28f35dc77447ed6457375d2a4e7b411955e042527.exe
Resource
win7-20240221-en
General
-
Target
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
-
Size
3.6MB
-
MD5
ef29f0f2a7b98ea19767b8ae66d1ffb8
-
SHA1
093b3916ee1bea0442278d0aa87be5703207e627
-
SHA256
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c
-
SHA512
9ab431d19633ed54dc1cc8bc4e511cabcfcba56ee0ff30197f5bd7aca07b33f2b605ab17f07fba066f5c910903f27bb04f4eb04cbed539af783564bbeba2c80e
-
SSDEEP
98304:yDqPoBhhRxcSUDk36SAEdhvxWa9P59Uc/Jf:yDqPSxcxk3ZAEUadv1
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3259) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 2684 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
Processes:
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe -
Drops file in Windows directory 1 IoCs
Processes:
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exedescription ioc process File created C:\WINDOWS\tasksche.exe b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D} b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D}\WpadDecision = "0" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0142000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D}\WpadDecisionTime = a0b06582b477da01 b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D}\2a-2f-02-f8-be-dd b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D}\WpadNetworkName = "Network 3" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-2f-02-f8-be-dd b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2395C772-A725-4CDB-8556-271BD9B61B9D}\WpadDecisionReason = "1" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-2f-02-f8-be-dd\WpadDecisionReason = "1" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-2f-02-f8-be-dd\WpadDecisionTime = a0b06582b477da01 b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\2a-2f-02-f8-be-dd\WpadDecision = "0" b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe"C:\Users\Admin\AppData\Local\Temp\b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe"1⤵
- Drops file in Windows directory
PID:2552 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2684
-
C:\Users\Admin\AppData\Local\Temp\b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exeC:\Users\Admin\AppData\Local\Temp\b764629e1f43851daf984c9372422b65ddceae28f83d6211873f4c8f8672c41c.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD54d2da4ff791ea108284e3dfb228f5f18
SHA110ebf8a7a69ed09292e7062840398c79fc8898f2
SHA256c5e3bc70fc27bd92fb2264ef45822098bafe19a1d3a9f7effeb174c33253a3f6
SHA5121387894dc45d6cdda5f0ad2eb8df506dd9f696ce966f40962ae03e0fe183cd70db7d7513aadc4b1709206e6f9890bc7be457f5e287689977cb25f4765b533183