Analysis Overview
SHA256
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2
Threat Level: Known bad
The file c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe was found to be: Known bad.
Malicious Activity Summary
Wannacry
Executes dropped EXE
Drops file in System32 directory
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Modifies data under HKEY_USERS
Modifies registry class
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-20 10:18
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-20 10:18
Reported
2024-05-20 10:19
Platform
win7-20240221-en
Max time kernel
35s
Max time network
20s
Command Line
Signatures
Wannacry
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\WINDOWS\tasksche.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\WINDOWS\tasksche.exe | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
Enumerates physical storage devices
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\42-35-df-dc-3d-6b | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionTime = 1007ad159faada01 | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511} | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionReason = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecisionTime = 1007ad159faada01 | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecision = "0" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadDecision = "0" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6DEFC3CB-1B7E-4923-BBD6-B2FEC944D511}\WpadNetworkName = "Network 3" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\42-35-df-dc-3d-6b\WpadDecisionReason = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings | C:\Windows\system32\rundll32.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security
C:\WINDOWS\tasksche.exe
C:\WINDOWS\tasksche.exe /i
C:\Windows\explorer.exe
"C:\Windows\explorer.exe"
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Pictures\GroupExport.dwg
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | udp |
| US | 104.16.167.228:80 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | tcp |
| US | 104.16.167.228:80 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | tcp |
Files
C:\Windows\tasksche.exe
| MD5 | d59d6d48c3d6e9292c296e557a186391 |
| SHA1 | 7f0916d7befcf929521087cde11b6d94d7331154 |
| SHA256 | 905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96 |
| SHA512 | 7b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-20 10:18
Reported
2024-05-20 10:19
Platform
win10v2004-20240426-en
Max time kernel
38s
Max time network
40s
Command Line
Signatures
Wannacry
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\WINDOWS\tasksche.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\WINDOWS\tasksche.exe | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security
C:\WINDOWS\tasksche.exe
C:\WINDOWS\tasksche.exe /i
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | udp |
| US | 104.16.167.228:80 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | tcp |
| US | 104.16.167.228:80 | www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com | tcp |
| US | 8.8.8.8:53 | 228.167.16.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| NL | 23.62.61.88:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 74.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.88:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 86.23.85.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
Files
C:\Windows\tasksche.exe
| MD5 | d59d6d48c3d6e9292c296e557a186391 |
| SHA1 | 7f0916d7befcf929521087cde11b6d94d7331154 |
| SHA256 | 905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96 |
| SHA512 | 7b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e |