Analysis

  • max time kernel
    144s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 20:45

General

  • Target

    WannaCry.exe

  • Size

    623KB

  • MD5

    eea571229a25bc2f5b59dce07c361cb2

  • SHA1

    b341437a1f94d645e5628d8491f068de1a049fb9

  • SHA256

    b0e67944726a2d7a14c9ce5fbfa1914b85666d547cc09118b278e89aeb5307cd

  • SHA512

    1b52740a0fbbb26cd8ad94167b443a81761ba8d48ae9b2931c924a2dcacb3de1727faf12858714712e863cd8d4a6412780ee466e45765565e707422ace583fca

  • SSDEEP

    12288:JzNGgFeDQ8sYnJl6+CIxNbMV6DqJ598Fu8l3hIX61Ho7:TGKUQ8sYJlFtMV6DqJ4u8lQ6S7

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WannaCry.exe
    "C:\Users\Admin\AppData\Local\Temp\WannaCry.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Fake\Starter.exe
      "C:\Fake\Starter.exe"
      2⤵
      • Executes dropped EXE
      • Sets desktop wallpaper using registry
      • Suspicious use of WriteProcessMemory
      PID:2456
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3552
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Drops desktop.ini file(s)
    • Checks processor information in registry
    • Modifies registry class
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • Filesize

    240KB

    MD5

    7bf2b57f2a205768755c07f238fb32cc

    SHA1

    45356a9dd616ed7161a3b9192e2f318d0ab5ad10

    SHA256

    b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25

    SHA512

    91a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9

  • C:\Fake\Starter.exe

    Filesize

    76KB

    MD5

    ad38305ac309c46033e2c65a25abc61f

    SHA1

    8e4fb6f0b4e62c2b6fdb92c4f5d884a7f7867bfd

    SHA256

    236e79f52960f6c8ec5c5ff9d15026953e2100c7c7ec8d1d2d6ee17e3ea5c8a4

    SHA512

    7be823bd1d2941253c38227faf23efe3801450f958a5ebd751354a8b672922c35d23df03c9e6af398fe4e15d4864dc78c68e52483af9b7e9840dab2c4245be44

  • C:\Fake\c.wnry

    Filesize

    781B

    MD5

    dda3d9a909dd715eab97991c30a607d2

    SHA1

    567e4ccc4d80fd1fe1b913a0403b6b69dde7da6b

    SHA256

    9435ac989c9253be8b7a27860dff07c265b4987e2dbd11f3c0b103dc691d3289

    SHA512

    428d7a5c851a5e5d630211970a2646b7266320800bde5fee3a98d7bfb52218ae649e243b46b5fbf2102bd9b65dad77ecb11831a229d139285c378c59beaa29f6

  • C:\Fake\msg\m_English.wnry

    Filesize

    36KB

    MD5

    fe68c2dc0d2419b38f44d83f2fcf232e

    SHA1

    6c6e49949957215aa2f3dfb72207d249adf36283

    SHA256

    26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5

    SHA512

    941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810

  • C:\Fake\msg\m_czech.wnry

    Filesize

    39KB

    MD5

    537efeecdfa94cc421e58fd82a58ba9e

    SHA1

    3609456e16bc16ba447979f3aa69221290ec17d0

    SHA256

    5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150

    SHA512

    e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b

  • C:\Fake\msg\m_indonesian.wnry

    Filesize

    36KB

    MD5

    3788f91c694dfc48e12417ce93356b0f

    SHA1

    eb3b87f7f654b604daf3484da9e02ca6c4ea98b7

    SHA256

    23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4

    SHA512

    b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd

  • C:\Users\Admin\Videos\Captures\desktop.ini

    Filesize

    190B

    MD5

    b0d27eaec71f1cd73b015f5ceeb15f9d

    SHA1

    62264f8b5c2f5034a1e4143df6e8c787165fbc2f

    SHA256

    86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

    SHA512

    7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c