Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-09-2024 21:10

General

  • Target

    202409295873e664cb6f8a2eab04fd41b860e018wannacry.exe

  • Size

    5.0MB

  • MD5

    5873e664cb6f8a2eab04fd41b860e018

  • SHA1

    9af44f70d4ee59f2d1d110ce79f79510a736be25

  • SHA256

    a01eea9838d6301dfff666282bb2b71fe25f9ba521829e5a08bd8a8047493d98

  • SHA512

    50352d53772af93aabaa22d897ae20f71a013022a0a39a31ed62469c5f63b0c8e7bd8aaa9e94f1140928b29c92628d3aac290baae60a0e26f75083aa18e85246

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAZ:yDqPoBhz1aRxcSUDk36SAE

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3264) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\202409295873e664cb6f8a2eab04fd41b860e018wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\202409295873e664cb6f8a2eab04fd41b860e018wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2108
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:800
  • C:\Users\Admin\AppData\Local\Temp\202409295873e664cb6f8a2eab04fd41b860e018wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\202409295873e664cb6f8a2eab04fd41b860e018wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    a98292d574a6963bc1750c67761d9439

    SHA1

    0531d86351b4e54a1355cfa75bf88eda8a5ea5f9

    SHA256

    3ece6b85021a3b4db03d55b3adb55604655c79c1f576ae6c7077dd6128b8cf0f

    SHA512

    eb2b1d7daf32a95547456393337baef913d2e78b9190ce4800924185a8ed0256831ac8e859f5b3debe160f2648b75004938b568e80459eb67f1c3c4f0660aa16