Analysis
-
max time kernel
139s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win10v2004-20240426-en
General
-
Target
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
-
Size
6.4MB
-
MD5
799202e44f072dbcd7de52b63e873fb8
-
SHA1
50d76ee4a9468e8df349e2dd81394a3627f44292
-
SHA256
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2
-
SHA512
47bee7eb4c5b4c82b167e66ce0093ad92f6e8523a09dea2605636280cdaef34311b1b23a697beb7c548cdfc69a54300c5ce2d66d1dffd7b749e456b2d0039859
-
SSDEEP
98304:9gqPoO1aRxcSUDk36SAEdhvxWa9P593RU:9gqPj1Cxcxk3ZAEUadzRU
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 2688 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Drops file in Windows directory 1 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process File created C:\WINDOWS\tasksche.exe c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE -
Modifies data under HKEY_USERS 24 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecisionReason = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadNetworkName = "Network 3" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecision = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058} c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecisionTime = 304b8b979eaada01 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecision = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\52-67-6c-72-4a-e1 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecisionReason = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecisionTime = 304b8b979eaada01 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
vlc.exeWINWORD.EXEpid process 620 vlc.exe 1692 WINWORD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 620 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1204 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1204 AUDIODG.EXE Token: 33 1204 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1204 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
vlc.exepid process 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
vlc.exepid process 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe 620 vlc.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
vlc.exeWINWORD.EXEpid process 620 vlc.exe 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE 1692 WINWORD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"1⤵
- Drops file in Windows directory
PID:2008 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2688
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exeC:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2444
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RepairPing.MTS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:620
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2572
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\SearchBackup.js"1⤵PID:2892
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\ConvertJoin.dot"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5d59d6d48c3d6e9292c296e557a186391
SHA17f0916d7befcf929521087cde11b6d94d7331154
SHA256905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96
SHA5127b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e