Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe
Resource
win10v2004-20240611-en
General
-
Target
2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe
-
Size
5.0MB
-
MD5
b96d96addb4a9c9e3a655a962ef30232
-
SHA1
7eafe7ecd5ea882bf3d98498a54ae613242c6fca
-
SHA256
9c9b598510b57c3b26563b19478414b3ca3e0ad8979f4cd03be9eb85777bf20a
-
SHA512
712890b8d8e9cf96c9b2bd64f42fab1f79cdaf947e76519a81be0ef495fd9188dfcf1615d780f156e6b56483b3c9433a700e68a299f4a9e02bb994aba6527a13
-
SSDEEP
49152:2nAQqMSPbcBVQej/N6SAARdhnvxJM0H9PAMEcaEau37:yDqPoBhzN6SAEdhvxWa9P5937
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3232) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4116 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe"1⤵
- Drops file in Windows directory
PID:3584 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_b96d96addb4a9c9e3a655a962ef30232_wannacry.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD521eff63a34491b44dacf0bf468af8124
SHA1168264c2da61f1f09eb14978415aaa9edee9601f
SHA25608cb6b6626aaf11dd58905d269677fd8b33fd978e3cea7108a7a100090ca663b
SHA5126fdca68baf81599cea1ccee5951c3db3d9fd9f904aff76c270f27cb58c09f2200faafbcca7bd48d143fdf165893b4f44c9ae4845aa6185c061fd8bad91766292