Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 01:37

General

  • Target

    5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe

  • Size

    316KB

  • MD5

    b9b3965d1b218c63cd317ac33edcb942

  • SHA1

    02408bb6dc1f3605a7d3f9bad687a858ec147896

  • SHA256

    5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9

  • SHA512

    18096b1167561c6da5bfcc05e40f7661e21f43521eb47da9520d2744c8a1806d7187894ce0ae8e0a9e97904b345daae09897d80e8754a63c9aa1d6514feaf98e

  • SSDEEP

    6144:xHQFwJYDzVc1aWLn0IU4eFTE3Ijr2Cq6j7+qmOq:Z6wWcYWL0IUzNGqJq

Malware Config

Extracted

Path

F:\$RECYCLE.BIN\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $200 worth of bitcoin to this bitcoin address: 1QAc9S5EmycqjzzWDc1yiWzr9jJLC8sLiY Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) https://www.dropbox.com/s/c1gn29iy8erh1ks/m.rar?dl=1 rar password: wcry123 Run and follow the instructions! �
Wallets

1QAc9S5EmycqjzzWDc1yiWzr9jJLC8sLiY

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 4 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe
    "C:\Users\Admin\AppData\Local\Temp\5d26835be2cf4f08f2beeff301c06d05035d0a9ec3afacc71dff22813595c0b9.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Sets desktop wallpaper using registry
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 55321720575447.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\cscript.exe
        cscript //nologo c.vbs
        3⤵
        • Loads dropped DLL
        PID:2904
    • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
      !WannaDecryptor!.exe f
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:1624
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im MSExchange*
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im Microsoft.Exchange.*
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im sqlserver.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1008
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im sqlwriter.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
      !WannaDecryptor!.exe c
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c start /b !WannaDecryptor!.exe v
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
        !WannaDecryptor!.exe v
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1072
          • C:\Windows\SysWOW64\vssadmin.exe
            vssadmin delete shadows /all /quiet
            5⤵
            • Interacts with shadow copies
            PID:2892
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic shadowcopy delete
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2196
    • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe
      !WannaDecryptor!.exe
      2⤵
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1032
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    7e7a1a23e7ee02bffc2dabb63efd6554

    SHA1

    e3359f0298b7151c46c576b96110b4435c987d4e

    SHA256

    ea5bf27142482bc76eb3053a2d129c0a96a1817abcfb76c599f5cc2df7c54192

    SHA512

    59ae5381f6dc2f88a839dd85daf180f41f323dba931ad364e02a6732cac7c91ce8fc5bb6a6e5acb621f7fdd11e9f6391adc105dffeded5c9ca61267c00472ee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_1D978D5EA8275AA72D1BFCD66AF4A751

    Filesize

    471B

    MD5

    651cd6cd7b0326fae0e52c9fd6a64355

    SHA1

    40045e10ea63f8b90664b1509aeef6fe93eb1997

    SHA256

    61b97d69e5e23ae9cb7cb7560ab67629d551236e409363169437c65932169727

    SHA512

    910c45668e4ff9e812424315c5d7131ba78ba581909b323cddf90ace573520fbf1e4e06bdce22d92420dc47b319da64024fde31977ea1546613eeeff9b127114

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    33efeeea1e582b809450ea314b1067e0

    SHA1

    75456d7115044b9dd28116d45a5560022526223b

    SHA256

    a8cbc4ed347f0f19c9f9bc357664e942ab2e54f8dd274c8a6247d431938d51ac

    SHA512

    9cb71ca8b47e431ff3fec2485b5ebd73d43e431379e42b99649859b04f184961897aeeba54219f2a77ea8a2857cd11e494b996363f8875567a6cc1af9c4d50e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e1e57c7e31511e569c47e40992bc346

    SHA1

    818f3b918abe287259666419f49f83e4b0eebbef

    SHA256

    dfa4f4e345eb6f1528cd16027ce84684c00ade61a0ca4dfda1a93c4f157648a5

    SHA512

    549dcbb603867b53406f202d7d8d83b4dc79ae82f9e3b351944c63a8bd65945961dc30da26b922c4fe473c3c4b9a94af5797440d4dd9e36f80db63423987d4d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f578f4a711c9d011510a90c5850705f

    SHA1

    62397dfdfb118d17b5e5651d5c3d49e6a73f1e8e

    SHA256

    97780598595110dddda5d1b11d7ce31712598f35615401f9b8d6b0a9c50b9951

    SHA512

    38c291d2585bb28c1a47d2086c19b5d9213420718387021272bb2d49fd28165e9d65a2e39657d351da21d8610eef42499b5c7c8af9d51006973a3ca63c82b089

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f08fb87b90cf0fdb59d3237f7b7c1d90

    SHA1

    960088f9025ca88fefeb6485e97ecb52a14ad6b8

    SHA256

    d1f71f3cdebcaf5edd423c1484792acc1e82237055c667aa50a3db040f212c9c

    SHA512

    6145da0c4fc6f3e156d558a2906cc302f566a5dc807ba8a3360108bf4db00b62fee1b11dad9f9ffd38564b7537a4a14d8e92194edf3a7aa694321401144abad6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67779699c7a20406d2a68ac1c631e7e4

    SHA1

    7a30c2f9b11b27e1b4c1394b1e4eda2fde5d7027

    SHA256

    c279711ae1d882fd0d1342b589f2d400011075b9cb2d42bb4e5b4564640e0c76

    SHA512

    d6e2ba5dcc27c766d36e5dbcbdca4c6e4fceaa9d9277e8f5babbc40365c29034843ae6759990f1906640c354406e1b792c65f2f4aa0a3a12ba976779f5fd4ae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    400B

    MD5

    57d28bc1a19084f91cc356384d0e7eb2

    SHA1

    43d05b44d66ef3dc85f73dbe0fdcbd2382c7dc54

    SHA256

    01526e06a2afb9ccaa010984b31cd35b74139530bbb68aba5fae249b79828178

    SHA512

    8299734c2a884e51854a78184418baf5799aa50afeddfb11aab95d282b49530c4c94cb959ff8d6bab553a79d4e743bba903a53461d011bbb373b0f49251924c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_1D978D5EA8275AA72D1BFCD66AF4A751

    Filesize

    396B

    MD5

    5068362c8a493f0840f7fe88e05ac7f3

    SHA1

    183ae702e9d4db8e1d63af04f28c3000a9e07239

    SHA256

    8128658832274d551828fde54e6d630475bc7ec7df8257ddc58d96558bbc85a0

    SHA512

    a334b02ee7dc4f962d4b945dc374b8c7669e5923d74314639b595d20214e54b74e4bb47bbd660165a5bb7c0c860470fe393761b5eda675d653f91a389406a887

  • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe

    Filesize

    236KB

    MD5

    abcb7d4353abee5083ddd8057c7cd1ff

    SHA1

    d8a2c1be4b47944d9afdf5e664e5db1364b66a5a

    SHA256

    eeb9cd6a1c4b3949b2ff3134a77d6736b35977f951b9c7c911483b5caeb1c1fb

    SHA512

    7d1ebb730a4c4833f2d690c80a35a73f3b7dbe2a83a642dbcf5e6d1d6aa4204a1513a28f74f32751727074b9f0072071deafea48cbe7d36081efd957a5244508

  • C:\Users\Admin\AppData\Local\Temp\!WannaDecryptor!.exe.lnk

    Filesize

    921B

    MD5

    7d0f96ee863a25ca3ccf862acebd0bd0

    SHA1

    91055e2b90463661a23836ae373ba99e016e8b87

    SHA256

    365cc751d40719b7ec542c626048c3a56db33175024c0f8fd399397a96792ece

    SHA512

    3366066954b04c8814442f1221500224d86c8bce78677bfb9ecf130570e167fee926a8946e7bd42965f28ecd275da5679ef9556c31e8d5a816d27b06e31fb746

  • C:\Users\Admin\AppData\Local\Temp\00000000.res

    Filesize

    136B

    MD5

    e137680a32d500b694d00dbe3c12712d

    SHA1

    6f5d527ecda1c01347e2b2558a74478e64df3b87

    SHA256

    34132f0903c91dbd80a479ab4df9f80136c3cd3b2ebda2174d1883ecb43caf9b

    SHA512

    7717922819b11803d7cc8fafbed527451216038dea8d5fc6936d32774210ffa07aa78307ec782a19fcbe18d79467806caa905a5ff03948a3f6ca83341db104dd

  • C:\Users\Admin\AppData\Local\Temp\00000000.res

    Filesize

    136B

    MD5

    e75bd212b6f8f3732f9db0933e1b7d2f

    SHA1

    bade5667b2320eb20f9481da486a13023b87588d

    SHA256

    00f95c01ca2e96f2c6aaa3e37fbf46e479869731f5f48e55c8d01c2ba12d3e72

    SHA512

    8171d26c642624b22672723d2ab4880aa6f47d8468e489170668427dcbc6a37c3f718bd8bd4baca6326e385146d91f0d42a551828e2095eb258743f2955557ce

  • C:\Users\Admin\AppData\Local\Temp\55321720575447.bat

    Filesize

    336B

    MD5

    3540e056349c6972905dc9706cd49418

    SHA1

    492c20442d34d45a6d6790c720349b11ec591cde

    SHA256

    73872a89440a2cba9d22bf4961c3d499ea2c72979c30c455f942374292fedadc

    SHA512

    c949d147100aef59e382c03abf7b162ae62a4d43456eebd730fbedcf5f95f5e1a24f6e349690d52d75331878a6ee8f6b88a7162ee9cf2a49e142196b12d0133c

  • C:\Users\Admin\AppData\Local\Temp\CabDF.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar101.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\b.wry

    Filesize

    1.4MB

    MD5

    99ae8326b4bc406daf54ddc7c5e43abe

    SHA1

    6ce5002f3cb55a8de0e8e8da77f0d0d0d7679183

    SHA256

    5054c415757f8a62abe0d61087d31e95065439d9ea1b364a6f207cdceaa24b7c

    SHA512

    756d7e44eb139501f5b3cf1ed0f76d1e8730c4dfd15f30bc23cda25102b240ad69784d414f995099c57610cf2f9bc9083b20fb4d303f1ca89f75e6819b8cf1d6

  • C:\Users\Admin\AppData\Local\Temp\c.vbs

    Filesize

    219B

    MD5

    5f6d40ca3c34b470113ed04d06a88ff4

    SHA1

    50629e7211ae43e32060686d6be17ebd492fd7aa

    SHA256

    0fb5039a2fe7e90cdf3f22140d7f2103f94689b15609efe0edcc8430dd772fc1

    SHA512

    4d4aa1abd2c9183202fd3f0a65b37f07ee0166ba6561f094c13c8ea59752c7bdd960e37c49583746d4464bc3b1dc0b63a1fe36a37ce7e5709cd76ed433befe35

  • C:\Users\Admin\AppData\Local\Temp\c.wry

    Filesize

    628B

    MD5

    01563f7b26f3be2e78ce4830b23dc3dd

    SHA1

    0edaedcb93c64242cfb12b2cd826e2f57ff0c4b9

    SHA256

    de1680e225c5434e8b664616cc07b1fef7faebcf42f37e50fd19fce6c2ab41aa

    SHA512

    6995b38dcdf61f8345808a92f497f1dc53b8437de7aa23e36db6f82cec723619844d4698f3a61e3416b7897708a42c679b1cf0e7e4fd17d6781b04d67184832f

  • C:\Users\Admin\AppData\Local\Temp\m.wry

    Filesize

    43KB

    MD5

    54c0e4aa798ce82886a96ba4bb449188

    SHA1

    71886d4d410013425243a00f15c270fc4f2a6a3a

    SHA256

    e5373e95a201b3b676072752097ff5d851a0a34e1be4194ff0c52c33601e576a

    SHA512

    4415559fa5da1192360b4d6db368179335661120443b812f5bc256466c79ecb6d36ed5d3c00a4e2590bf70e473565287a7db53f6aa3f8faaad46f21e34e84298

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\LFW4WPL4.txt

    Filesize

    120B

    MD5

    26a9eb0a99bb60b530613c130ae179ef

    SHA1

    68f0976088246c669fb42609507a4f3a3ecc5317

    SHA256

    2aafa77a71c8425c188dead22837cf1bccba48847b3208ffd9a349b55a053a9b

    SHA512

    15faac03ab5dcd02576a7353375450dda3e6d6b107a1730a1731d5874cfc068a3c4e180e37d56e6b70f1fdc5d9855e85dc723ced6512de7652ac9e9bd18aa84e

  • F:\$RECYCLE.BIN\!Please Read Me!.txt

    Filesize

    849B

    MD5

    66c169379186555b050c266dd5f9ce29

    SHA1

    45568656a50454ae85cc49c12872bad0167945ac

    SHA256

    90bb163d3350460dd30132a16e15d37bc1d5932af354cad83dbedb46275b6861

    SHA512

    926a185bbe8989f9cbba6fa635883e8514b70fa66247ef5ba51dce19b73bd1d3a6b8c4ab98f4f8b4e55ab19054b19e1ca38e4949e8a042a51db09d8528ced2d0

  • memory/2088-8-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB