Resubmissions

01-07-2024 14:09

240701-rf4vhsyhrk 10

01-07-2024 14:08

240701-rfj54syhpp 10

01-07-2024 11:10

240701-m9zensyapa 10

Analysis

  • max time kernel
    98s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 11:10

General

  • Target

    2024-07-01_75b350c8f7e67883d1ba9d71198cef1b_wannacry.exe

  • Size

    5.0MB

  • MD5

    75b350c8f7e67883d1ba9d71198cef1b

  • SHA1

    833a369367059b5ae28542fea0eee425140b70ff

  • SHA256

    4aec93b2e437151c2d618a9dddb37957a27529b6b3577bccd41ee057beac8d67

  • SHA512

    cc08357d1bb621ec3bcb1f7d0055dd52c477f70327377f0aec9767281318a0c6c37294d15f7d59ab3cbe39fd589d9a11f8ae8f3983c78d5a72f2af634a1fa660

  • SSDEEP

    49152:2nAQqMSPTx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEcaEau3R8yAH:yDqPTxcSUDk36SAEdhvxWa9P593R8yA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2931) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-01_75b350c8f7e67883d1ba9d71198cef1b_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-01_75b350c8f7e67883d1ba9d71198cef1b_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    PID:2212
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4536
  • C:\Users\Admin\AppData\Local\Temp\2024-07-01_75b350c8f7e67883d1ba9d71198cef1b_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-07-01_75b350c8f7e67883d1ba9d71198cef1b_wannacry.exe -m security
    1⤵
    • Modifies data under HKEY_USERS
    PID:1468
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:556

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      7f1cd7f071ee1e55b6d10990c31bdc14

      SHA1

      c8848b84a15bf538ca7ecefcf362ddb4e11b4a43

      SHA256

      83f9c04a45f3be7cd72e98089ca121bdedaa49f7c45f84df915fdcea970a0245

      SHA512

      f76f7244cf78f0623ac3284694854d99cad5c9e86a2efc591c053f50e0f0c48aaff59abe873cf665d04d4fbdb8b252eeebee8ae79e95ce44f2e5bac4e27b61f9