Resubmissions

11-06-2024 12:56

240611-p6qz8sxeqc 10

11-06-2024 12:56

240611-p6cgvaxhrn 10

11-06-2024 12:53

240611-p4mj2axhmj 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 12:56

General

  • Target

    2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe

  • Size

    5.0MB

  • MD5

    bf86e3bba6212a58f4923dfee37f360d

  • SHA1

    82827607dc32ab560618267ea3551b4b2068da71

  • SHA256

    baad53c5f4c4165efb6e03a911abd3a3afda33eeeb046625ede7fccbb32509ff

  • SHA512

    cd4fc73059583196957caee2c4942b0adf2d9e9b05358f20ee2a9b5dc1d654d47e7b04968733a4a519c3d3f424858c4c204c2751d8a99916f9e0a63092cbc396

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9P:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2936) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 4 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 59 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    PID:1152
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2204
  • C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe -m security
    1⤵
    • Modifies data under HKEY_USERS
    PID:2720
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:512
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:4500
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
        2⤵
        • Modifies data under HKEY_USERS
        PID:1148
    • C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe"
      1⤵
      • Drops file in Windows directory
      PID:4932
      • C:\WINDOWS\tasksche.exe
        C:\WINDOWS\tasksche.exe /i
        2⤵
        • Executes dropped EXE
        PID:4616
    • C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe"
      1⤵
      • Drops file in Windows directory
      PID:4608
      • C:\WINDOWS\tasksche.exe
        C:\WINDOWS\tasksche.exe /i
        2⤵
        • Executes dropped EXE
        PID:3384
    • C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-06-11_bf86e3bba6212a58f4923dfee37f360d_wannacry.exe"
      1⤵
      • Drops file in Windows directory
      PID:4636
      • C:\WINDOWS\tasksche.exe
        C:\WINDOWS\tasksche.exe /i
        2⤵
        • Executes dropped EXE
        PID:4584
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      469ea6f2c5d9d4ac749651e2f5a0f6a9

      SHA1

      5c7c3b5cd9f518c3922bb907836fbad662c8729f

      SHA256

      29b50bde6dac39948c22579248c96a3488c5c94c6f127a4bd11d24abfcb6569f

      SHA512

      96ec39bcdca9a4a2352e377cb20676a7a197dbe015ef0a61eb281a65c867955d9f065cf6e102ef2083aab27a501bc34e07536abbfc19bafe225f628803fd083a

    • memory/1148-53-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-44-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-63-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-40-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-52-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-41-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-42-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-48-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-43-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-47-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-46-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-50-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-51-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-49-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-54-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-67-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-39-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-69-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-45-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-55-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-56-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-57-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-58-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-59-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-60-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-61-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-62-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-64-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-65-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-66-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/1148-68-0x00000241F6330000-0x00000241F6340000-memory.dmp

      Filesize

      64KB

    • memory/2684-19-0x000001FD81350000-0x000001FD81360000-memory.dmp

      Filesize

      64KB

    • memory/2684-3-0x000001FD81120000-0x000001FD81130000-memory.dmp

      Filesize

      64KB

    • memory/2684-35-0x000001FD85710000-0x000001FD85718000-memory.dmp

      Filesize

      32KB