Malware Analysis Report

2024-10-19 07:31

Sample ID 240520-l969vaeh29
Target c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
SHA256 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2
Tags
wannacry execution ransomware worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2

Threat Level: Known bad

The file c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe was found to be: Known bad.

Malicious Activity Summary

wannacry execution ransomware worm

Wannacry

Executes dropped EXE

Drops file in System32 directory

Drops file in Windows directory

Command and Scripting Interpreter: JavaScript

Unsigned PE

Suspicious use of SendNotifyMessage

Suspicious use of SetWindowsHookEx

Modifies data under HKEY_USERS

Suspicious behavior: AddClipboardFormatListener

Suspicious use of FindShellTrayWindow

Suspicious behavior: GetForegroundWindowSpam

Modifies Internet Explorer settings

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-20 10:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-20 10:15

Reported

2024-05-20 10:17

Platform

win7-20240221-en

Max time kernel

139s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"

Signatures

Wannacry

ransomware worm wannacry

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\WINDOWS\tasksche.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\WINDOWS\tasksche.exe C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A

Command and Scripting Interpreter: JavaScript

execution

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecisionReason = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadNetworkName = "Network 3" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0119000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecision = "0" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058} C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\WpadDecisionTime = 304b8b979eaada01 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecision = "0" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FDEBB75B-19A0-40AE-B650-10C634716058}\52-67-6c-72-4a-e1 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecisionReason = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\52-67-6c-72-4a-e1\WpadDecisionTime = 304b8b979eaada01 C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files\VideoLAN\VLC\vlc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe

"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security

C:\WINDOWS\tasksche.exe

C:\WINDOWS\tasksche.exe /i

C:\Program Files\VideoLAN\VLC\vlc.exe

"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\RepairPing.MTS"

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x4f8

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\SearchBackup.js"

C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n /f "C:\Users\Admin\Desktop\ConvertJoin.dot"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com udp
US 104.16.167.228:80 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com tcp
US 104.16.167.228:80 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com tcp

Files

C:\Windows\tasksche.exe

MD5 d59d6d48c3d6e9292c296e557a186391
SHA1 7f0916d7befcf929521087cde11b6d94d7331154
SHA256 905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96
SHA512 7b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e

memory/620-17-0x000007FEF77B0000-0x000007FEF77E4000-memory.dmp

memory/620-16-0x000000013FFD0000-0x00000001400C8000-memory.dmp

memory/620-18-0x000007FEF6730000-0x000007FEF69E4000-memory.dmp

memory/620-19-0x000007FEF5320000-0x000007FEF63CB000-memory.dmp

memory/1692-20-0x000000005FFF0000-0x0000000060000000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-20 10:15

Reported

2024-05-20 10:17

Platform

win10v2004-20240426-en

Max time kernel

130s

Max time network

137s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"

Signatures

Wannacry

ransomware worm wannacry

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\WINDOWS\tasksche.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\WINDOWS\tasksche.exe C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe

"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe

C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security

C:\WINDOWS\tasksche.exe

C:\WINDOWS\tasksche.exe /i

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com udp
US 104.16.167.228:80 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com tcp
US 104.16.167.228:80 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com tcp
US 8.8.8.8:53 228.167.16.104.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 23.62.61.129:443 www.bing.com tcp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 129.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 130.211.222.173.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

C:\Windows\tasksche.exe

MD5 d59d6d48c3d6e9292c296e557a186391
SHA1 7f0916d7befcf929521087cde11b6d94d7331154
SHA256 905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96
SHA512 7b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e