Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 11:29

General

  • Target

    4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa.exe

  • Size

    5.0MB

  • MD5

    0d004a9ca726fb42f31d5573b5ff79e3

  • SHA1

    7b37d9d5bc4dc0b2c767c737cb757bc76ef2c058

  • SHA256

    4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa

  • SHA512

    4975b0836987eb196aca7c7f7b694592573cd8e36d365c204f409d599f6acba9971bf31d94572f84929f0f996bdc7131c74c6a1f25fbae2e077e3c35dc24cef8

  • SSDEEP

    49152:QnpENbcBVQe01INRx+TSqTdX1HkQo6SAARdhnv:Qp+oBh01aRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3248) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa.exe
    "C:\Users\Admin\AppData\Local\Temp\4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:760
  • C:\Users\Admin\AppData\Local\Temp\4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa.exe
    C:\Users\Admin\AppData\Local\Temp\4053226761886f7076044880b27adc4a441c1e05e041eb1eb66bad0b647367aa.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:3228
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4256,i,3409420486566309625,12100452682816721435,262144 --variations-seed-version --mojo-platform-channel-handle=4248 /prefetch:8
    1⤵
      PID:2288

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      2.0MB

      MD5

      90b4050408a6daf42b0fe666b2f1b41b

      SHA1

      8b2d64befe94ab1c692b3d9218764560bfd7ad05

      SHA256

      99a622faf7fa1f73c8c2df50589cfb917fdb093e7336675e8d2e51b449d3e7e9

      SHA512

      2f8113a333be1e4c57e99b223ad6f8d9609e97ae4be5a1f155714d3a65f0c0c6dc6e51a9f4bf3237492c751e9ff0f36fce391e0661c70781f234e618c993674b