Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 16:23
Static task
static1
Behavioral task
behavioral1
Sample
20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe
-
Size
5.0MB
-
MD5
225f3606ab5b8673ff0e164ca787e3f7
-
SHA1
b8fb3bfcd6a3f8dd642320d3800eae3a85fca429
-
SHA256
30c346f447a35817cd319e6f3aa7b9c5f9effa39655fde07c5e297d73ca2c59d
-
SHA512
96cb8b0f00ea053db58bfa9604d381e23b8c12848cddb93b18448204a1497df90a663991646dcfd27b026f5587ac874534ce2c087ceb8ae32da24ae6c8172814
-
SSDEEP
49152:2nAQqMSPbcBVQej/OANR2Qo6SAARdhnv:yDqPoBhzOyR236SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3340) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 1684 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe"C:\Users\Admin\AppData\Local\Temp\20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4484 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exeC:\Users\Admin\AppData\Local\Temp\20240921225f3606ab5b8673ff0e164ca787e3f7wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:81⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD51e1c669222be96ed02afe2a77ca77bdd
SHA1701665ac3ab80b76a815cefd433906e0d19de787
SHA256e2933f0d81d2f6844fd7cf87120e3b608604c6769288dd562041a0d763882e60
SHA5122b55034c2380cc5d55a12dc267953c24c11b71154c5c02ccbbfe5768b67c3b9b883934bc70457050bda7e1b59734941fb38a87d24aa959a46fee2c829ce7319c