Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
3c605f2e9af22601b6dec4daa2c95fc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c605f2e9af22601b6dec4daa2c95fc0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3c605f2e9af22601b6dec4daa2c95fc0N.exe
-
Size
5.0MB
-
MD5
3c605f2e9af22601b6dec4daa2c95fc0
-
SHA1
54fa86b01803db3cbe588a5f3be19773256fe518
-
SHA256
65ffed1aa8fe44b4261f214de32f74e853d43d1b9ca425182ae0193ea5d29a9d
-
SHA512
e96217a27b25e534f733db84098644fa736a93d54de72a1d76a73f29960be77ac657f7989b4b8bdd40437b5f9072070e518f9487ba78fe4510ec68c361b1ce69
-
SSDEEP
6144:eE9l9ynRIYVTH5DgSgNajldktM0XXrO2/HJKyrYev3AiiVjAqZfAgbJ3iqMgAyY:e1bLgmlu//dhAvVLJAmd3A
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (2445) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2664 tasksche.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\8QDQ8072.txt 3c605f2e9af22601b6dec4daa2c95fc0N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 3c605f2e9af22601b6dec4daa2c95fc0N.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\GCQXYDK8.txt 3c605f2e9af22601b6dec4daa2c95fc0N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\GCQXYDK8.txt 3c605f2e9af22601b6dec4daa2c95fc0N.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\8QDQ8072.txt 3c605f2e9af22601b6dec4daa2c95fc0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 3c605f2e9af22601b6dec4daa2c95fc0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2832 2664 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c605f2e9af22601b6dec4daa2c95fc0N.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1} 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1}\WpadDecisionReason = "1" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1}\96-61-f8-e4-07-51 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1}\WpadDecision = "0" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-61-f8-e4-07-51 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-61-f8-e4-07-51\WpadDecisionReason = "1" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0079000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1}\WpadNetworkName = "Network 3" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-61-f8-e4-07-51\WpadDecisionTime = d03be69386dfda01 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\96-61-f8-e4-07-51\WpadDecision = "0" 3c605f2e9af22601b6dec4daa2c95fc0N.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{78FCC7E4-8795-47DA-A471-97464895CEA1}\WpadDecisionTime = d03be69386dfda01 3c605f2e9af22601b6dec4daa2c95fc0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 332 wrote to memory of 2664 332 3c605f2e9af22601b6dec4daa2c95fc0N.exe 32 PID 332 wrote to memory of 2664 332 3c605f2e9af22601b6dec4daa2c95fc0N.exe 32 PID 332 wrote to memory of 2664 332 3c605f2e9af22601b6dec4daa2c95fc0N.exe 32 PID 332 wrote to memory of 2664 332 3c605f2e9af22601b6dec4daa2c95fc0N.exe 32 PID 2664 wrote to memory of 2832 2664 tasksche.exe 33 PID 2664 wrote to memory of 2832 2664 tasksche.exe 33 PID 2664 wrote to memory of 2832 2664 tasksche.exe 33 PID 2664 wrote to memory of 2832 2664 tasksche.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c605f2e9af22601b6dec4daa2c95fc0N.exe"C:\Users\Admin\AppData\Local\Temp\3c605f2e9af22601b6dec4daa2c95fc0N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 363⤵
- Program crash
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\3c605f2e9af22601b6dec4daa2c95fc0N.exeC:\Users\Admin\AppData\Local\Temp\3c605f2e9af22601b6dec4daa2c95fc0N.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5250ff99090260532ff0acf9da52e8602
SHA1f51193260ef8396caf576c432ddaece649928a6b
SHA256faeebe09f45e15faf27a262ef3780feed5b4c3e885cad37742635fd490d74109
SHA512be5fefd2744a2277b6ac1a24899e6112775e0e48fd7d7868032a7984bb84cbafdb9e628682e21650a5521ba1168ca3686079842b83e2a946f41b47e8dae2b475