Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22-07-2024 10:26

General

  • Target

    2024-07-22_1fa7507ba7e3c483184c331cca635107_wannacry.exe

  • Size

    5.0MB

  • MD5

    1fa7507ba7e3c483184c331cca635107

  • SHA1

    2eb9f968963340bcb2e14b7bbba1f6609f8dc0d2

  • SHA256

    e2c9ad058386f27e5b69c734fa345cfe335d6ee9c8e09ca2275c6d1a3862e411

  • SHA512

    4101cf048344f219d4ad1a4a9ee0568d9854991236cbac49b2c274bbb23ee7c0827817f09da28c9c030a2290c08b23a104727df3b2afc0c29299e4e4bad66da9

  • SSDEEP

    49152:QnoQqMSPbcBVQejdINRx+TSqTdX1HkQo6SAARdh:QbqPoBh5aRxcSUDk36SAEdh

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3232) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-22_1fa7507ba7e3c483184c331cca635107_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-22_1fa7507ba7e3c483184c331cca635107_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    PID:2452
  • C:\Users\Admin\AppData\Local\Temp\2024-07-22_1fa7507ba7e3c483184c331cca635107_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-07-22_1fa7507ba7e3c483184c331cca635107_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads