Analysis
-
max time kernel
9s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Resource
win10v2004-20240508-en
General
-
Target
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
-
Size
6.4MB
-
MD5
799202e44f072dbcd7de52b63e873fb8
-
SHA1
50d76ee4a9468e8df349e2dd81394a3627f44292
-
SHA256
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2
-
SHA512
47bee7eb4c5b4c82b167e66ce0093ad92f6e8523a09dea2605636280cdaef34311b1b23a697beb7c548cdfc69a54300c5ce2d66d1dffd7b749e456b2d0039859
-
SSDEEP
98304:9gqPoO1aRxcSUDk36SAEdhvxWa9P593RU:9gqPj1Cxcxk3ZAEUadzRU
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 1 IoCs
Processes:
tasksche.exepid process 3536 tasksche.exe -
Drops file in Windows directory 1 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process File created C:\WINDOWS\tasksche.exe c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe"1⤵
- Drops file in Windows directory
PID:1660 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exeC:\Users\Admin\AppData\Local\Temp\c94e6405266a5101501962b24eb1c43ad64e271eb3346e8889c610cec267eec2.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:4184
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5d59d6d48c3d6e9292c296e557a186391
SHA17f0916d7befcf929521087cde11b6d94d7331154
SHA256905ad8e2fc1f98ab1e934de1d01d85973291ccadd41c85ba1a7dcc3b2af6ed96
SHA5127b2fc97070ac47e6596cfe0da96b1b1369feeb4ab62af136f172ee306187cee3e04b68b8f786d7b4b4dee49054d53a33cd8048abdc8cba9853b3e119a08ac23e