Analysis
-
max time kernel
47s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe
Resource
win11-20240704-en
General
-
Target
7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe
-
Size
5.0MB
-
MD5
f818de50174c5473e210f9a1f77c2a51
-
SHA1
e50bcffef4f01b3dda9252e58fe4ed64958f68f0
-
SHA256
7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856
-
SHA512
b38560452bca88d4b58bffdd7067b5d2d374ffeb27b00e7ccb2311b2941dfc99718c1bafdcdc0879b1bb8805fe8f3583bfbf6b5cf9fea257cb2962e70b152aa8
-
SSDEEP
49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9PAMEc:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P5
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Executes dropped EXE 1 IoCs
pid Process 4592 tasksche.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe"C:\Users\Admin\AppData\Local\Temp\7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe"1⤵
- Drops file in Windows directory
PID:2320 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exeC:\Users\Admin\AppData\Local\Temp\7223cfafb10b86d22c147d3669691be17aae253e5f5975fd0a82e1fdc2ab5856.exe -m security1⤵
- Modifies data under HKEY_USERS
PID:3036
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5050501fafc2bb40530e6a6dd655bc8c8
SHA1cc1e5ceba1663b26afcd44667a9701a77d581c14
SHA256d2c98fbaef69627e9d661d3566f10d75895a427a74ccbd6f91d4540619535e87
SHA5122fee84ccd8174d42373b08d01016e80a2fae94107a02f529f5020060f57983b21a922860d6f588297094c9b797f317460dccf9fb30761b960e18bf11f684975e