Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-03-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe
-
Size
1.5MB
-
MD5
cbf11121a636562be24b401ea284fbf6
-
SHA1
f1847babf9b66796f7cab3a0d60f2a835c2369f5
-
SHA256
45244d593f039cf013e698e0491b7ce8c97d99b77ba163a7f39189182ec74fd6
-
SHA512
4d7007d24e56238c31fdf6201e0ffd96942fab50d5157ad91148fcadf16645bd1110b787cbc21c6eb9e3b6397a817eb2a4bbfefef7f06aaf52fbb97bd2a9bf23
-
SSDEEP
24576:ekoVELjVcn5Xw7qLlu5oSZ++RiIIlmB3QdMM5MctSj/0KxyV7obw:iOyn9VLFL+0DlvdnMcgj/03
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\Desktop\Wallpaper = ".\\wallpaper\\WanaDecryptor.bmp" 2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exedescription pid process target process PID 2456 wrote to memory of 2484 2456 2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe WerFault.exe PID 2456 wrote to memory of 2484 2456 2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe WerFault.exe PID 2456 wrote to memory of 2484 2456 2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-24_cbf11121a636562be24b401ea284fbf6_wannacry.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2456 -s 7802⤵PID:2484