Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe
-
Size
2.2MB
-
MD5
beb195b7ca4824b4113b1e5a6c3b9b25
-
SHA1
4c2e1c8d6ff93972b7ef74464144151b1cfe94d6
-
SHA256
dbb1dc4da1940ea8fc53364d6b9f72b3f1586aea6686479fd0fb2d110afe23db
-
SHA512
6686b2389c94f4ddbb71158ded7cbf20602271e70db66fb20966ea7188281668ca68a3149ff0acf4be548e48857ef7f5a9701ca3d017e7dac4963e9d4a0c0c17
-
SSDEEP
12288:e1bLgmluCti62WfSm0iEcQhfYNVUyqT2WY9jr9RHkvjEz:QbLguriIfEcQdIVUXJc
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3307) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 4100 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 4 IoCs
Processes:
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe -
Drops file in Windows directory 3 IoCs
Processes:
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exetasksche.exedescription ioc process File created C:\WINDOWS\tasksche.exe 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe File created C:\Windows\__tmp_rar_sfx_access_check_240598515 tasksche.exe File created C:\Windows\eee.exe tasksche.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exedescription pid process target process PID 4676 wrote to memory of 4100 4676 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe tasksche.exe PID 4676 wrote to memory of 4100 4676 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe tasksche.exe PID 4676 wrote to memory of 4100 4676 2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe tasksche.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4100
-
C:\Users\Admin\AppData\Local\Temp\2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-05-09_beb195b7ca4824b4113b1e5a6c3b9b25_wannacry.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\tasksche.exeFilesize
2.0MB
MD5fb3f03c76f319ba79409e2dcb2e25084
SHA12ab1c8803a9aedc82c6f81c4372b5ad9d4b53417
SHA256f198438457dc9483c4f4247a3f7e10cbb735220cd1ee60163c58fa28402d2db5
SHA5127da5426a05b689b0684a7b4496e51dd17038336c5ac8c16acdb759895f901017f63ffd69cf118f949d62375640e496987b9ffccdfcb6fb5c9cb659785b1ee36c
-
C:\Windows\tasksche.exeFilesize
1.2MB
MD5f18aeda50a88ff2db91eb50a2257aedc
SHA1018557fd0d316eff7ff74f2af3372059da4352d0
SHA256b999d078ea452289bae4273a4b5fa8134ce658cf6e552e95edd248cbcbf13527
SHA51278e86419267630abfedbae03a309b1ad8d279d0a0d4fe28d0337e84ffc23f6b30b8002439efa7468c550357252938042ac9fb42459cccbe5046d40c6232fddd7