Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 09:38

General

  • Target

    2024-09-29_5873e664cb6f8a2eab04fd41b860e018_wannacry.exe

  • Size

    5.0MB

  • MD5

    5873e664cb6f8a2eab04fd41b860e018

  • SHA1

    9af44f70d4ee59f2d1d110ce79f79510a736be25

  • SHA256

    a01eea9838d6301dfff666282bb2b71fe25f9ba521829e5a08bd8a8047493d98

  • SHA512

    50352d53772af93aabaa22d897ae20f71a013022a0a39a31ed62469c5f63b0c8e7bd8aaa9e94f1140928b29c92628d3aac290baae60a0e26f75083aa18e85246

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAZ:yDqPoBhz1aRxcSUDk36SAE

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3331) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_5873e664cb6f8a2eab04fd41b860e018_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_5873e664cb6f8a2eab04fd41b860e018_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2124
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1116
  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_5873e664cb6f8a2eab04fd41b860e018_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-09-29_5873e664cb6f8a2eab04fd41b860e018_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4708
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4380 /prefetch:8
    1⤵
      PID:1784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      a98292d574a6963bc1750c67761d9439

      SHA1

      0531d86351b4e54a1355cfa75bf88eda8a5ea5f9

      SHA256

      3ece6b85021a3b4db03d55b3adb55604655c79c1f576ae6c7077dd6128b8cf0f

      SHA512

      eb2b1d7daf32a95547456393337baef913d2e78b9190ce4800924185a8ed0256831ac8e859f5b3debe160f2648b75004938b568e80459eb67f1c3c4f0660aa16