Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 03:00

General

  • Target

    d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08.exe

  • Size

    5.0MB

  • MD5

    02a87628edf10f6fe827cad8206dab00

  • SHA1

    c946ee90f39b8cc8e631c2dc1857ec0d96d7d24e

  • SHA256

    d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08

  • SHA512

    d142e64acd01d38c046f48150d93ecc8b875574fdbec0a3a9c10e1538296d3ec9e4cb3089806221ff4f1a7804b90ca72648461d9db191c0c7331040f1963a949

  • SSDEEP

    98304:ZDqPoBhz1aRxcSUDkWx7QY83EKx1eKOCXc:ZDqPe1CxcxkA7j83PxISXc

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2918) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08.exe
    "C:\Users\Admin\AppData\Local\Temp\d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2316
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4976
  • C:\Users\Admin\AppData\Local\Temp\d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08.exe
    C:\Users\Admin\AppData\Local\Temp\d3c89375e696aabf4fb1307c918df335d0849e4278551d45aea9cbbbf3416b08.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    23a7477cfc59a613471d698c46ca7345

    SHA1

    b8ee0366e853acd48a27ded7ad5c834ecf6f1927

    SHA256

    e4f4d5272f442d7abee7bd9bfd478766e7a81afc2f4959edbe61f60136cb2a24

    SHA512

    9693e5f2cd4f563589479b768b98011b6768b8dcfc897479ba4010caff60c634e50c772b0dcfeefe13f41c0b015e48f74d8ebd2c6a0b4e30202d7047acbd5358