Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe
-
Size
5.0MB
-
MD5
94206135fa1aa6622e5cb90a3ee9803f
-
SHA1
982c76d8acbe2926db76509dc6f7d15d665d6f6f
-
SHA256
2bceff53768b359ceb45e8d2b90ec84432f80ef45ee2cff7bd5056ee82ea1b30
-
SHA512
f39ea3688604a4f9bbe656e577d1c1d8a5b3089951e5d3ab86524fa42d062fd4bf65f4d7ae4bde814252416d08222ba471f7b1c543f1ddb80e2beb9ed215aa50
-
SSDEEP
49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAR:Z8qPoBhz1aRxcSUDk36SAE
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3391) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4204 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4008 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-08-11_94206135fa1aa6622e5cb90a3ee9803f_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD51c615bf80a47848f17f935e689ae7ee2
SHA13a870692662ccb90c0dcb76b6c3365995bde64f8
SHA2565f2b33deee53390913fd5fb3979685a3db2a7a1ee872d47efc4f8f7d9438341f
SHA512d119e4090c3508ad0704978d4e0623e79b9b6052e995c725581038e2ac3d71807f3b77f288c004b3fc6ce0a39960a79b76f9ec8e00308a573bb9b6119092fba3