Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe
-
Size
5.0MB
-
MD5
82ad20f7216ba47eddfe5f9c2bcf9fce
-
SHA1
8c669c666f2c42cbb37c2505d00495c6d023855c
-
SHA256
69e2a4bd84ab85c7d65263d35195ffaa6d626d4a15943398ae8692093bf83086
-
SHA512
d425327ce162013d68ab868009449f642678c6a4c5ccbc561963a21535dd3b279c08761c42e57c280e70f3afbe3c4b19efbf6a1ad82abba2a3dd1366ff879a7d
-
SSDEEP
49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAk3R8yAH1plAH:yDqPoBhz1aRxcSUDk36SAD3R8yAVp2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2692) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2724 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe"1⤵
- Drops file in Windows directory
PID:1360 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exeC:\Users\Admin\AppData\Local\Temp\2024070282ad20f7216ba47eddfe5f9c2bcf9fcewannacry.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD55af0b40cb63069bc7e9d77b1ee3d0a40
SHA1ddd94c426aa45156554c9690d953fc7eb713649c
SHA2565a3f5b88692ac7da72ca8f8181eb1c1f50ce8504972a26925a6833fbd2f6a8f8
SHA51258b35f73353be78d449e0e3e80c2f873da5394aa2b5aff93d6b0410e3a3cabe6b6f24f5bf93af4d3349576f337bf9c369a0f6cfc0e95ca7f53f4ab9c60e84b4a