Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe
-
Size
3.6MB
-
MD5
654b35309ba5da582a844b331ac973b6
-
SHA1
bfd64481bfbf387c60c99961e1c88d8b1a715d52
-
SHA256
5dc1fefd645c696c4538f7476823f5f19d3c686ab45b57207af9a20601f86c23
-
SHA512
ea4e3e244502ae008c60e38a844ea8866306371175984e657f089fcb9b9337671d74911b5c3503cae600348d4b04b23d87aca918ff0d18fa0152ff50358d3bf5
-
SSDEEP
49152:2nAQqMSPbcBD6c//bCKYWu0J6izuLzJYtqIOUpKDfAVJ9:yDqPoBl7zuL2pgk
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3342) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2360 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2500 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_654b35309ba5da582a844b331ac973b6_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD505da683d084e6e03b47bda19fb9ee142
SHA1bc0b3daa2c33501680c2b304d58b0cc762fe376c
SHA256a79867a698f370b8602f67ced1d6c12a241121b842d3fbc1135a65f4625ca698
SHA512281b0d648e4462d234d487e34094b83a06430d4c3aa90f3e839e8e2def66d25ee9af10ff271f0f9ed46224cfecef52cbafb610094dd3b4b0076f5088897aa290