Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 12:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe
-
Size
5.0MB
-
MD5
1f132682160c33b85bc32f280b2ce70c
-
SHA1
47666b3d473c5529ba76951a1f749f01b6e1ceb5
-
SHA256
0136e271dc5aa1c134738a0eedb6bb662a0b7d45697d964d38af4c117d3c5f65
-
SHA512
3c6d229b4be308fd6788072c202b42e06fbe92c4777ffd241f47b91e36b7c4d285cab7cfe7160cb7b3cba6b9115704dac054e0edfd5648854d6d0832c5189d94
-
SSDEEP
49152:VnjQWKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhnv:Z8IfBhz1aRxcSUDk36SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3236) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 3028 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe"1⤵
- Drops file in Windows directory
PID:1680 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_1f132682160c33b85bc32f280b2ce70c_wannacry.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5e137dadbaba64454a258e8f6f914dad4
SHA1a039e8110d1a9b8209a49e12b2bafbcb2f117091
SHA256ba0d9257fbda935cf006187d932aa839ad0985292e9ff0eb3ddad40d24cba26d
SHA51278ad08ad991e5d70cdd682cba522ee1f907a671114f8dba3443f740d6b7d8cda72c1068e994be30869fd42ba9e21b663341e7f30e9d948bdbc0a98de08c42478