Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 11:26

General

  • Target

    2024-07-09_0d004a9ca726fb42f31d5573b5ff79e3_wannacry.exe

  • Size

    5.0MB

  • MD5

    0d004a9ca726fb42f31d5573b5ff79e3

  • SHA1

    7b37d9d5bc4dc0b2c767c737cb757bc76ef2c058

  • SHA256

    4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa

  • SHA512

    4975b0836987eb196aca7c7f7b694592573cd8e36d365c204f409d599f6acba9971bf31d94572f84929f0f996bdc7131c74c6a1f25fbae2e077e3c35dc24cef8

  • SSDEEP

    49152:QnpENbcBVQe01INRx+TSqTdX1HkQo6SAARdhnv:Qp+oBh01aRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3224) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_0d004a9ca726fb42f31d5573b5ff79e3_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-09_0d004a9ca726fb42f31d5573b5ff79e3_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2708
  • C:\Users\Admin\AppData\Local\Temp\2024-07-09_0d004a9ca726fb42f31d5573b5ff79e3_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-07-09_0d004a9ca726fb42f31d5573b5ff79e3_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\tasksche.exe

    Filesize

    2.0MB

    MD5

    90b4050408a6daf42b0fe666b2f1b41b

    SHA1

    8b2d64befe94ab1c692b3d9218764560bfd7ad05

    SHA256

    99a622faf7fa1f73c8c2df50589cfb917fdb093e7336675e8d2e51b449d3e7e9

    SHA512

    2f8113a333be1e4c57e99b223ad6f8d9609e97ae4be5a1f155714d3a65f0c0c6dc6e51a9f4bf3237492c751e9ff0f36fce391e0661c70781f234e618c993674b