Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 10:15

General

  • Target

    2024-09-29_dcd56ac87d6511c83c1eeb4cf221eb74_wannacry.exe

  • Size

    5.0MB

  • MD5

    dcd56ac87d6511c83c1eeb4cf221eb74

  • SHA1

    bfd964502b2fb9e80ed169f1ccabad9e9ea32def

  • SHA256

    8cdd42dddad7b21644c82f65544f72626509c3ca644a5a85de5ee3ac953a9c04

  • SHA512

    4864e827c6b9e020576a0057657fecd2278177c6949a5c84d89e14f89590973234682309160fa4310c8423c9d02a9699c606a7445b2214f1ceca8619b27a5ccd

  • SSDEEP

    24576:2bLgddQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKyAj4qrowS:2nAQqMSPbcBVQej/1INk4qroX

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3287) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_dcd56ac87d6511c83c1eeb4cf221eb74_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-29_dcd56ac87d6511c83c1eeb4cf221eb74_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4968
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:3788
  • C:\Users\Admin\AppData\Local\Temp\2024-09-29_dcd56ac87d6511c83c1eeb4cf221eb74_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-09-29_dcd56ac87d6511c83c1eeb4cf221eb74_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    e037c70b7dc694a386319498997bb44f

    SHA1

    6e85af2f387219426f60ca23d0bc272be6f2894a

    SHA256

    7be49d48b9704770a3904d260dbe67be3f01b6482802ce3ddec64b1113b42a51

    SHA512

    5a46b364772d8234711c3b36295e387a9d5646b41cdecde53d9fa3068a7ada4cefa1886569c5b7a287d98a7b7917f6d0bb6f3dd5a046e5a1c55f626d9b4b780c