Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe
-
Size
3.6MB
-
MD5
2febaaba479fad71532694f96f8813ed
-
SHA1
cd24e13a546d5f0cfb6952952edfac00c508d520
-
SHA256
0fcb7e00b2841edc8ecac3cf6a3bffee6487197247190125dcda2ad0e8941df5
-
SHA512
18e717269d0af7859165d64dd841c4e3c0a8c9935dd23f5830a4d6810b7fe5651eec31cebdc20e48df33e7182d334ec6be395a9b5d469d0340cea34a35b05e7e
-
SSDEEP
98304:yDqPoB7RxcSUDk36SAixWa9P593R8yAVp2HI:yDqP+xcxk3ZAVadzR8yc4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3268) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4368 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3172 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_2febaaba479fad71532694f96f8813ed_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5140751082670bda9f7fa36a6aa498396
SHA1c515cfcc27a49620041c5dc0dbb3bf044c64a030
SHA256970e10e00399f50035743ebe23fd88a58f0f25d74280778e74a0878829ae11e1
SHA5121346ba578385a14baf849d00061aa2427d526876f5268c6712eeb052fb300e18a8c898350baf1d860d31964ddd52613bd3c3a291d9284b1a0363c0ed4e5e50eb