Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
202409276c451c97435add16490e2cf87b95b182wannacry.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
202409276c451c97435add16490e2cf87b95b182wannacry.exe
Resource
win10v2004-20240802-en
General
-
Target
202409276c451c97435add16490e2cf87b95b182wannacry.exe
-
Size
3.6MB
-
MD5
6c451c97435add16490e2cf87b95b182
-
SHA1
6924cef359a76f5a0be3df988d105556388b0672
-
SHA256
f549063e1c47466a04b358e90c4a219079022539b3d65c4f796c8474e831994b
-
SHA512
53f6f1b47d963414468d8bae351ed2bc813bed09b658671f8854c3302f6f88962ca36884ea3acdb09d06ede6c7757a054b1edc392097288de0995cd148659d5e
-
SSDEEP
98304:Z8qPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yA:Z8qPe1Cxcxk3ZAEUadzR8y
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3307) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2752 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 202409276c451c97435add16490e2cf87b95b182wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 202409276c451c97435add16490e2cf87b95b182wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409276c451c97435add16490e2cf87b95b182wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409276c451c97435add16490e2cf87b95b182wannacry.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 202409276c451c97435add16490e2cf87b95b182wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202409276c451c97435add16490e2cf87b95b182wannacry.exe"C:\Users\Admin\AppData\Local\Temp\202409276c451c97435add16490e2cf87b95b182wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2432 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\202409276c451c97435add16490e2cf87b95b182wannacry.exeC:\Users\Admin\AppData\Local\Temp\202409276c451c97435add16490e2cf87b95b182wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD50ecdcda326466a915b7f37fa6f726c6e
SHA143070064e425aaec98f661789230e2b2ec5a940e
SHA256e38aadb253b25f407fcbe3a68c629239965ff04b4f11b941fc1414c57f402e1f
SHA512593f656c0c7cafb303b442ca77e73ae7678ba511ebff207afc4f0cfd6e37790a8910c26ac80eb42f0a89fdc71c1680c73b3d604535b6655798df9cd806494ae8