Resubmissions

09-08-2024 14:23

240809-rqfwfa1gqn 10

09-08-2024 13:23

240809-qm63sa1djl 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 13:23

General

  • Target

    2024-08-09_1a5d4cb874f56fe6a97939192d411b8e_wannacry.exe

  • Size

    8.0MB

  • MD5

    1a5d4cb874f56fe6a97939192d411b8e

  • SHA1

    3ef1ef5f95311642729260a8943770d2818bee74

  • SHA256

    0f9228939702a12e0c07215383c63734eac714eb32182be2e230eec80c8cfe7d

  • SHA512

    1ec3765dea6663d7a3b1e4d45066c8453d930f21ffa057a6123ecf7cd037e5bf3f65b46a74e7cc2f399b34b4e4ce74f68e22cc1262977acaffee3c1bdfac8884

  • SSDEEP

    49152:U0qALES64w1sbfMZuZR30hlhbFv6yELWTKZKy/KniB/:5bd3kbFSkOZK9i

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Renames multiple (860) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 33 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-09_1a5d4cb874f56fe6a97939192d411b8e_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-09_1a5d4cb874f56fe6a97939192d411b8e_wannacry.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\WANNATRY\00000000.pky

    Filesize

    283B

    MD5

    d865ce638145bee04043d3dba81ded8b

    SHA1

    5ccde3062771f95817b17f19e7f7c56ef7efc179

    SHA256

    0d11b5a0b3367beaee54bcd6d0704eca3313a4e971bab817703a69ad29e26e06

    SHA512

    147192e77e3af18754f421d0cc5c872ed88da71ea0ed1f455f7b9192742fadb3eb8526cf86542d26e9975fad1244c70d807128dac6583ae41f751feb1c1c4896

  • memory/3628-0-0x00007FF63E950000-0x00007FF63F1E8000-memory.dmp

    Filesize

    8.6MB

  • memory/3628-1-0x00007FF63E950000-0x00007FF63F1E8000-memory.dmp

    Filesize

    8.6MB