Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 11:08
Static task
static1
Behavioral task
behavioral1
Sample
202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe
-
Size
3.6MB
-
MD5
0e1348bbba0c267e031edb6149c9ea5d
-
SHA1
b2602649dff3895e11ccd2a82722d608941d7928
-
SHA256
5f5d3280c47371a32b3b838979752ba38806c79f83b01bef23b811e57c9a7b57
-
SHA512
d2a0c8562d9675d7d3b18f756d3940ebdeeb2b35c5ef566b081f88a1639f161791664a93c3cc6f983fdda1bc33d901406b03b8d1b68d6d66c3c885006eda3e3c
-
SSDEEP
49152:tnNQYMSPbcBV6j/TNRxe6SAARdhnvoVvI:hWYPoB4z5Rxe6SAEdhvX
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3353) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 3352 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe"C:\Users\Admin\AppData\Local\Temp\202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4424 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exeC:\Users\Admin\AppData\Local\Temp\202408230e1348bbba0c267e031edb6149c9ea5dwannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5582d04ff78da5bfd311804f49be81219
SHA18141c26f7f37f0313d5906fc0a2efe5df8775197
SHA2565e45f72706f10483c079cd0a829d1b32dc92dfc977ed90420450869e3aad1d30
SHA512b81483a4db7db5b94d05db9e0f7266f3ad59d4217f0718236b345a1a217a55a35ab2655ce2b1edc3a06cbf70e4cf0008941194e8842d97abeb970afd85db5ebe