Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-07-2024 07:53

General

  • Target

    2024-07-05_702737badf91c84ce7053b6cc66879c5_wannacry.exe

  • Size

    3.6MB

  • MD5

    702737badf91c84ce7053b6cc66879c5

  • SHA1

    28a500b016a7b2266b0c3ef89a43d755043fe6af

  • SHA256

    7adf5e7f49313da0f967fb9213e66fee4cb6bf7472b5513ea0d9b87908b9837f

  • SHA512

    9b15dfff18f70174c75fc7b0e6344ba4011ceab43b89cc34f7957a6531ca57ef6ba2b653fcf75fc4bc772a506fd7db25e83c7872313c2baebc545e89ee779f49

  • SSDEEP

    98304:Z8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yADxc:Z8qPe1Cxcxk3ZAEUadzR8y+xc

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3088) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-05_702737badf91c84ce7053b6cc66879c5_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-05_702737badf91c84ce7053b6cc66879c5_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    PID:1572
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1416
  • C:\Users\Admin\AppData\Local\Temp\2024-07-05_702737badf91c84ce7053b6cc66879c5_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-07-05_702737badf91c84ce7053b6cc66879c5_wannacry.exe -m security
    1⤵
      PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      4eaad4e5667b3bb087567afe4abc47a9

      SHA1

      d8a449fe3cd649b2bf4845e94d3e3260f7f4a811

      SHA256

      2f4c29f86e675a9f0110cd20bcc4d910f8383113ca6f173b62488f7f62f7e205

      SHA512

      198bf154cada71ba479cb600c7522ae6ab48db43785a3509af279474b64b485564c35c7212081871a87d112a6c4db97f330155d3e3285cb0f604eba75c4bdf5f