Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 13:03

General

  • Target

    2024-07-06_d589446d31d43c35466f7e3eec3d6139_wannacry.exe

  • Size

    5.0MB

  • MD5

    d589446d31d43c35466f7e3eec3d6139

  • SHA1

    b8790367518561360649cd98723807e1ae52ab97

  • SHA256

    b1d4ab3b68eaab8baefa433ae725490b82a6b295a69e13a5985c3b15bd8e304c

  • SHA512

    f7616d76588e05ee9beb1bc3f4395ce6885252ed89181b6ab9720ef90904ec8f439c86e08d1d3871931f771d329919041c6831eae1777b7e45d1050676e3f134

  • SSDEEP

    49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SA:Z8qPoBhz1aRxcSUDk36SA

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3318) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-06_d589446d31d43c35466f7e3eec3d6139_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-06_d589446d31d43c35466f7e3eec3d6139_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    PID:4164
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4868
  • C:\Users\Admin\AppData\Local\Temp\2024-07-06_d589446d31d43c35466f7e3eec3d6139_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-07-06_d589446d31d43c35466f7e3eec3d6139_wannacry.exe -m security
    1⤵
      PID:396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      2a68debf793b7d42464f5ddf9d70cd72

      SHA1

      dad1b9dbab1bf1f31fcbb881f254323ae9cc4a77

      SHA256

      74f41b499284c05865d77c3acc911a89c70d56541308b4df12092ae10a834c1c

      SHA512

      4b6e6ee87cd419bd5577be980191fab5d3c688946acdde2c4f7409bda34380341beb4f2dfe5c5def677af535533f566292ee18b82a7634082027f95c23299ba8