Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2024 08:02
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe
Resource
win10-20240404-en
General
-
Target
2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe
-
Size
3.6MB
-
MD5
407ae9c5b340c881ea1f32f283422057
-
SHA1
37dbd712c948a1c1a545347297bb7677234fc259
-
SHA256
72365c4e88e9f461f930becfceb13c09901ad5fb51e96c08174357d855819710
-
SHA512
5df17c4dccc178b2313a6365218dfdb8c916fb6dce8f2729209949d8565629da1f96b8a8c1e98d1656d837a327d7bf8ac4558ab2c4eeac1dacfa93831e194df2
-
SSDEEP
49152:2nAQqMSPbcBVQej/OANR2Qo6SAARdhnv:yDqPoBhzOyR236SAEdhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3288) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 1104 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3152 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-09-23_407ae9c5b340c881ea1f32f283422057_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD51e1c669222be96ed02afe2a77ca77bdd
SHA1701665ac3ab80b76a815cefd433906e0d19de787
SHA256e2933f0d81d2f6844fd7cf87120e3b608604c6769288dd562041a0d763882e60
SHA5122b55034c2380cc5d55a12dc267953c24c11b71154c5c02ccbbfe5768b67c3b9b883934bc70457050bda7e1b59734941fb38a87d24aa959a46fee2c829ce7319c