Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe
-
Size
5.0MB
-
MD5
ac9f9b8198c987fdd42bcecf80000616
-
SHA1
5ef02a59b486bf2493ec83f57019d6200a0d141e
-
SHA256
7a380638ed5b5db29d1d25402fd213eb607b4efc923104eac65c86f223efd4bc
-
SHA512
01408e9e2f2e3ca87cf1e252d3d84c4353cb2ae1c9dcdaecc16936ba57897e70ada5a458082ba67546eb1a36d76465f3262217908c43f921c724466f92d30062
-
SSDEEP
98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2:yDqPe1Cxcxk3ZAEUadzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3331) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2720 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe"1⤵
- Drops file in Windows directory
PID:4532 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-07-01_ac9f9b8198c987fdd42bcecf80000616_wannacry.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD548bd7d9d30f615665e6fbe5b6e43f8b8
SHA19f60d7761627f2e580ec5605fce1ad9cab8582fb
SHA25628307c402fe2d42a226bc50c8144e3b07e47ea9e0a4131d61f058311c7aee88e
SHA5120560b05f4ab4f6e1675e573f69659254221478e6dd7e87dee68f356987d0754f5d63a680fee6034b997f2f762cfc8b32825e6c758df3466e4c81b6c840d8ee7a