Resubmissions

22/08/2024, 18:39

240822-xamxpsvarj 10

09/05/2023, 03:14

230509-drczaafh6w 10

Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 18:39

Errors

Reason
Machine shutdown

General

  • Target

    2023-05-08_8a016c4ee71532f20b892bb35eb954f4_wannacry.exe

  • Size

    6.4MB

  • MD5

    8a016c4ee71532f20b892bb35eb954f4

  • SHA1

    204c97ab720d12e6fa04cd8bea6da019c1d4317e

  • SHA256

    ce2194c96ebab334f8484a7a3e45e2c3bb74296fc5eddd335abf3f5c65f34967

  • SHA512

    a0ecffce2b724287e8ab01d23d95839d7e522bc27dc14be26b5089bf8704a46c176a87f02648f6ba646938217afb1b33c6e6557ff3dce528497d9b321310c9bd

  • SSDEEP

    6144:YE9l9yKqIYVTH5DgSg8ajldktM0XXrV2QhMV9qb:YJbLgPluwQhMb

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-05-08_8a016c4ee71532f20b892bb35eb954f4_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-05-08_8a016c4ee71532f20b892bb35eb954f4_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\ProgramData\wkiigmgqs580\tasksche.exe
        C:\ProgramData\wkiigmgqs580\tasksche.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1764
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h .
          4⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:2088
        • C:\Windows\SysWOW64\icacls.exe
          icacls . /grant Everyone:F /T /C /Q
          4⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:2108
  • C:\Users\Admin\AppData\Local\Temp\2023-05-08_8a016c4ee71532f20b892bb35eb954f4_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2023-05-08_8a016c4ee71532f20b892bb35eb954f4_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2768
  • C:\Windows\system32\cmd.exe
    cmd.exe /c "C:\ProgramData\wkiigmgqs580\tasksche.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\ProgramData\wkiigmgqs580\tasksche.exe
      C:\ProgramData\wkiigmgqs580\tasksche.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h .
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2352
      • C:\Windows\SysWOW64\icacls.exe
        icacls . /grant Everyone:F /T /C /Q
        3⤵
        • Modifies file permissions
        • System Location Discovery: System Language Discovery
        PID:2688
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\InstallConvertFrom.dll
    1⤵
    • Modifies registry class
    PID:3060
  • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" "C:\Users\Admin\Desktop\StartSplit.ppt"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2008
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2012
    • C:\Windows\System32\fontview.exe
      "C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\WatchMount.ttf
      1⤵
        PID:3024
      • C:\Windows\ehome\ehshell.exe
        "C:\Windows\ehome\ehshell.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x1a4
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StopEdit.3gp"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1344
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\MoveAssert.wma"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1512
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:1556
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:264

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\vlc\ml.xspf

                  Filesize

                  304B

                  MD5

                  781602441469750c3219c8c38b515ed4

                  SHA1

                  e885acd1cbd0b897ebcedbb145bef1c330f80595

                  SHA256

                  81970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d

                  SHA512

                  2b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461

                • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                  Filesize

                  504B

                  MD5

                  e747bed0e5e1f3a27259240f10ef61c5

                  SHA1

                  e6a7f33ac22c45613b07f251fd3cb1dc096d1caf

                  SHA256

                  cd47d303a3be3b3ae696c35a4a8201fd336ce910d8191ccfbb98482a27ff3eb2

                  SHA512

                  2c25452a1c522d2f4eea8a22014a5cd60b90196f1ecdad72fc1b35c4016d05d1958e3db37c2389816b2631a74dc55402bd2bc8760dbee2e2fc175bd4b4a6be56

                • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

                  Filesize

                  573B

                  MD5

                  896ca196bd71ebd286e7270d7a4b0bbf

                  SHA1

                  50215fe6b085fe3a971d5be93a4bd95977e196bf

                  SHA256

                  591a5e6f3ce423dac788374a4df8c536f3cd1ff70dcde62bbbc73f2c3771cf2b

                  SHA512

                  c03c010137f8962997a31be9692956716b1d4037e3a1957817c4fdf37d1fac7b773a2d11a66c86f2103f0c2d90cd3b7b01035b8517ef20c86269708e9dc657f1

                • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock

                  Filesize

                  18B

                  MD5

                  e8d6f5d0bdec0b3dd769b15b3f611d9e

                  SHA1

                  6f13e5ac38b1f4d7db57c9748451cb0fd7a05830

                  SHA256

                  8dc8a0436b2283f19a426294ee6315d837032eadebd354d058c507dd1fd6411c

                  SHA512

                  e55241861acce1e5eded2602af3055e509d418f4b3516ed1743b6b740bc49c69e799d419ea694e6befb6706d1601a3ad174758586e0bb85e23ff89e3f00f9d3a

                • C:\Users\Admin\AppData\Roaming\vlc\vlcrc

                  Filesize

                  94KB

                  MD5

                  7b37c4f352a44c8246bf685258f75045

                  SHA1

                  817dacb245334f10de0297e69c98b4c9470f083e

                  SHA256

                  ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e

                  SHA512

                  1e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02

                • C:\Windows\tasksche.exe

                  Filesize

                  3.4MB

                  MD5

                  a27cfbfad728fa5ec8e701a6f93cab26

                  SHA1

                  deba582c9c8f059590132395f987c2acf54e7a7f

                  SHA256

                  c0057fd3141966017014beb71fa2e31d84d3ddd2a9f20e3e6ee26df8165a531f

                  SHA512

                  8c095ccb3367903bc5498d0222ee537ef2bbd4f4204fe9a9a9babe2426d8a377240a15892e248e6e252bf3b229eecc8b1c960136988bf3398941e20a1e542b5d

                • memory/836-13-0x000000005FFF0000-0x0000000060000000-memory.dmp

                  Filesize

                  64KB

                • memory/836-14-0x000000005FFF0000-0x0000000060000000-memory.dmp

                  Filesize

                  64KB

                • memory/1344-53-0x000007FEED630000-0x000007FEED8E6000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1344-54-0x000007FEEC160000-0x000007FEED210000-memory.dmp

                  Filesize

                  16.7MB

                • memory/1344-52-0x000007FEEF510000-0x000007FEEF544000-memory.dmp

                  Filesize

                  208KB

                • memory/1344-51-0x000000013FD90000-0x000000013FE88000-memory.dmp

                  Filesize

                  992KB

                • memory/1512-91-0x000000013FAE0000-0x000000013FBD8000-memory.dmp

                  Filesize

                  992KB

                • memory/1512-93-0x000007FEF65F0000-0x000007FEF68A6000-memory.dmp

                  Filesize

                  2.7MB

                • memory/1512-92-0x000007FEF7290000-0x000007FEF72C4000-memory.dmp

                  Filesize

                  208KB

                • memory/1512-94-0x000007FEF5E80000-0x000007FEF5F8E000-memory.dmp

                  Filesize

                  1.1MB

                • memory/2012-15-0x000000005FFF0000-0x0000000060000000-memory.dmp

                  Filesize

                  64KB

                • memory/2768-12-0x0000000000400000-0x0000000000A73000-memory.dmp

                  Filesize

                  6.4MB

                • memory/2840-0-0x0000000000400000-0x0000000000A73000-memory.dmp

                  Filesize

                  6.4MB

                • memory/2840-10-0x0000000000400000-0x0000000000A73000-memory.dmp

                  Filesize

                  6.4MB

                • memory/3032-37-0x000000001B690000-0x000000001B69A000-memory.dmp

                  Filesize

                  40KB

                • memory/3032-36-0x000000001B690000-0x000000001B69A000-memory.dmp

                  Filesize

                  40KB

                • memory/3032-35-0x000000001D9A0000-0x000000001D9D7000-memory.dmp

                  Filesize

                  220KB

                • memory/3032-33-0x000000001EF30000-0x000000001EFE8000-memory.dmp

                  Filesize

                  736KB

                • memory/3032-32-0x000000001CEB0000-0x000000001CF4E000-memory.dmp

                  Filesize

                  632KB

                • memory/3032-31-0x000000001E760000-0x000000001E8E4000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3032-30-0x000000001E150000-0x000000001E758000-memory.dmp

                  Filesize

                  6.0MB