Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe
-
Size
5.0MB
-
MD5
3c605f2e9af22601b6dec4daa2c95fc0
-
SHA1
54fa86b01803db3cbe588a5f3be19773256fe518
-
SHA256
65ffed1aa8fe44b4261f214de32f74e853d43d1b9ca425182ae0193ea5d29a9d
-
SHA512
e96217a27b25e534f733db84098644fa736a93d54de72a1d76a73f29960be77ac657f7989b4b8bdd40437b5f9072070e518f9487ba78fe4510ec68c361b1ce69
-
SSDEEP
6144:eE9l9ynRIYVTH5DgSgNajldktM0XXrO2/HJKyrYev3AiiVjAqZfAgbJ3iqMgAyY:e1bLgmlu//dhAvVLJAmd3A
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3145) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2664 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\D2TL2ZJ3.txt 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\D2TL2ZJ3.txt 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\VNYUAAZS.txt 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\VNYUAAZS.txt 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2664 WerFault.exe 31 -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6}\WpadNetworkName = "Network 3" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f018b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6}\WpadDecisionReason = "1" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6}\0a-10-21-5d-4d-05 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-10-21-5d-4d-05\WpadDecisionTime = 80f0857dffdcda01 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-10-21-5d-4d-05\WpadDecisionReason = "1" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-10-21-5d-4d-05\WpadDecision = "0" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6} 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-10-21-5d-4d-05 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6}\WpadDecisionTime = 80f0857dffdcda01 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2AF2C4EC-6979-4381-93E3-330CCC4516E6}\WpadDecision = "0" 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2664 2960 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe 31 PID 2960 wrote to memory of 2664 2960 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe 31 PID 2960 wrote to memory of 2664 2960 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe 31 PID 2960 wrote to memory of 2664 2960 2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe 31 PID 2664 wrote to memory of 2812 2664 tasksche.exe 32 PID 2664 wrote to memory of 2812 2664 tasksche.exe 32 PID 2664 wrote to memory of 2812 2664 tasksche.exe 32 PID 2664 wrote to memory of 2812 2664 tasksche.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 363⤵
- Program crash
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-07-23_3c605f2e9af22601b6dec4daa2c95fc0_wannacry.exe -m security1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5250ff99090260532ff0acf9da52e8602
SHA1f51193260ef8396caf576c432ddaece649928a6b
SHA256faeebe09f45e15faf27a262ef3780feed5b4c3e885cad37742635fd490d74109
SHA512be5fefd2744a2277b6ac1a24899e6112775e0e48fd7d7868032a7984bb84cbafdb9e628682e21650a5521ba1168ca3686079842b83e2a946f41b47e8dae2b475