Resubmissions
17-05-2024 14:03
240517-rc1zfsbc57 1017-05-2024 14:03
240517-rcqtgsba71 1017-05-2024 08:57
240517-kwt7paag82 10Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe
-
Size
3.6MB
-
MD5
55b72bea66ca2fb439d73b0be8a5e053
-
SHA1
df444deae68cc250bf60df69e13352af014abe22
-
SHA256
a7704c41e002390f36619d21cdecbc3b7defa9b89c2107270a04cf5a817ad6f1
-
SHA512
cbf5632f2af69fe95fe67ba3e632863bc470f8d5b820a7972054e0bd89cf6fc250f1a6d93e805cc40c229ab6ffda027f46d9fd6bace975cb1c0e0a12a1ab9722
-
SSDEEP
49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SA0O26:Z8qPoBhz1aRxcSUDk36SA0O26
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 2852 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe -
Drops file in Windows directory 1 IoCs
Processes:
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exedescription ioc process File created C:\WINDOWS\tasksche.exe 2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 1 IoCs
Processes:
2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1352 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1352 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
vlc.exepid process 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
vlc.exepid process 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe 1352 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1352 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe"1⤵
- Drops file in Windows directory
PID:2340 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-05-17_55b72bea66ca2fb439d73b0be8a5e053_wannacry.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1680
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\FormatMount.shtml1⤵
- Modifies registry class
PID:1660
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StartEdit.mp2v"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD53a5c335d035981a74fe2898dd2a7d333
SHA167fef51914e994fd8c6a53700d80e183b3c2f245
SHA256ff1a311baafb2aa211d4417ed30ed86576da5c45cdf09d5afce2043b6d680e53
SHA51269c3cfec2ed70b203446f59cddd22f1fddc340d87353feeb17f08cd938e4a645cbf5516563bd382899fecafbb97fa9af504960c7657ce86b5a8f28b4c2b2b211
-
memory/1352-17-0x000007FEF6BC0000-0x000007FEF6BF4000-memory.dmpFilesize
208KB
-
memory/1352-16-0x000000013FC80000-0x000000013FD78000-memory.dmpFilesize
992KB
-
memory/1352-18-0x000007FEF59C0000-0x000007FEF5C74000-memory.dmpFilesize
2.7MB
-
memory/1352-19-0x000007FEF4490000-0x000007FEF553B000-memory.dmpFilesize
16.7MB