Analysis
-
max time kernel
35s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 10:18
Static task
static1
Behavioral task
behavioral1
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win10v2004-20240426-en
General
-
Target
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
-
Size
6.4MB
-
MD5
799202e44f072dbcd7de52b63e873fb8
-
SHA1
50d76ee4a9468e8df349e2dd81394a3627f44292
-
SHA256
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2
-
SHA512
47bee7eb4c5b4c82b167e66ce0093ad92f6e8523a09dea2605636280cdaef34311b1b23a697beb7c548cdfc69a54300c5ce2d66d1dffd7b749e456b2d0039859
-
SSDEEP
98304:9gqPoO1aRxcSUDk36SAEdhvxWa9P593RU:9gqPj1Cxcxk3ZAEUadzRU
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 2580 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Drops file in Windows directory 1 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process File created C:\WINDOWS\tasksche.exe c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 24 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\42-35-df-dc-3d-6b c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionTime = 1007ad159faada01 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511} c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionReason = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionTime = 1007ad159faada01 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecision = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecision = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadNetworkName = "Network 3" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionReason = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"1⤵
- Drops file in Windows directory
PID:2256 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2580
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exeC:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2052
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2388
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Pictures\GroupExport.dwg1⤵
- Modifies registry class
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5d59d6d48c3d6e9292c296e557a186391
SHA17f0916d7befcf929521087cde11b6d94d7331154
SHA256905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96
SHA5127b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e