Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 08:38

General

  • Target

    2024-09-30_8cac1af6e1bcb38bc8129965bff3e499_wannacry.exe

  • Size

    3.6MB

  • MD5

    8cac1af6e1bcb38bc8129965bff3e499

  • SHA1

    d09cbc36bd232d82cd666682e693763f88019d72

  • SHA256

    2b33bf908376f0920e5a2080320302d0e2156e8c7843cee70034d93611b763cb

  • SHA512

    06a2b13011b97f3d0ebd701d76539591376e3d8df699d5bcf9d1a2a934de5a0555ba511fad3864908b7cff06c6ac4cf355c853629796370258b088f58608488b

  • SSDEEP

    98304:yDqPoBORxcSUDk36SAEdhvxWa9myAVp2HI:yDqPZxcxk3ZAEUagyc4HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3200) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-30_8cac1af6e1bcb38bc8129965bff3e499_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-30_8cac1af6e1bcb38bc8129965bff3e499_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2220
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2696
  • C:\Users\Admin\AppData\Local\Temp\2024-09-30_8cac1af6e1bcb38bc8129965bff3e499_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-09-30_8cac1af6e1bcb38bc8129965bff3e499_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    ea5d696dcfc0105e624cace9fd446661

    SHA1

    5141cede58ee9d6a1b5f3a475204437162ad5044

    SHA256

    dbe37c132889727f03b53a921a3fb658c99a6b93d9fb98a3d94c10e4ca5723b2

    SHA512

    e44ff67e7a75e73a0ad8cdeaad432853341298c7ade8d195156c9d3b37066c211d1eb0b0a289234e81de5725a2d250a35ac5d0bafe88e977b93807ac84d0a864