Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe
-
Size
3.6MB
-
MD5
77abd528f8b42d7af37582450d508bbd
-
SHA1
4c8aee6d8a8420d06fb243ebe345a5bebfdbc550
-
SHA256
0b3ca341ddbd0738897f19f85a6881c5edb04cb78f5eedfa23f78459bd6352db
-
SHA512
eac563d6015bf9f9795409853bf3d8bff5e0ad7279136c2235dc1490cdec1a6a730b72b3bfaa4cbfbaed8c7de3d586867138cd6ad27dfa8ec3ee0db75f8f1af5
-
SSDEEP
98304:XDqPoBz7aRxcSUDk36SAEdhvxWa9P593R8yAVp2HY:XDqPGCxcxk3ZAEUadzR8yc4HY
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3346) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 3844 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3988 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-08-18_77abd528f8b42d7af37582450d508bbd_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4056,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD56acefe8ac45268375b73d87404088e19
SHA13eb6fe933e76a0616cb7a757d5f5049734199527
SHA25694be05ef50bd9dfff19c396f888c9d8f40790dae05b776c7e61578ba3ba18624
SHA5125dfe3ebb82740102500f0c6e3549c5d1e2f34c32349f06f0005299d71923b041b0b383df49f6dd9a03b6a4f5885f088192f398b7a5b19cc3541fad7bd2f45812