Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 09:44

General

  • Target

    2024-09-30_b80b888d3f54987589f09c1b9eae72e8_wannacry.exe

  • Size

    5.0MB

  • MD5

    b80b888d3f54987589f09c1b9eae72e8

  • SHA1

    bfe0137524a2f4171dda7151eed0abb4393b001e

  • SHA256

    cd21ce23e1ff3e49d9c8ba2a696ac7a89b3555462f097fb41c718552bfc2fb6c

  • SHA512

    a4ce2baa2bef00e82e4466e596d4ce5f64edd3a19e0bd2cf5ffce06d7a8c9cbe5d1fed15077d6f294846981555f030d37a235f7e6f58060c27b2da69c2fcb7d2

  • SSDEEP

    24576:bbLgdeQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLK:bnjQqMSPbcBVQej/1IN

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3176) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-30_b80b888d3f54987589f09c1b9eae72e8_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-30_b80b888d3f54987589f09c1b9eae72e8_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1992
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2708
  • C:\Users\Admin\AppData\Local\Temp\2024-09-30_b80b888d3f54987589f09c1b9eae72e8_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-09-30_b80b888d3f54987589f09c1b9eae72e8_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    24a2668fb4148b58b26cd98bfbd72daa

    SHA1

    7242a546804313d2c1ba776b32fc92ee48538896

    SHA256

    d586ddf9932bf682eb6f14b022dcde7dfe0b7e496afd8218947d5596f2177afc

    SHA512

    4daff2eabf726844004ef60627fd532fb4f141abd4b46ab6f4375bde55c0601b1e2847c2238eeaa5b10760242581f33f6a8917425ce312bf91251bac37792d5e

  • memory/1992-0-0x0000000000400000-0x0000000000A72000-memory.dmp

    Filesize

    6.4MB

  • memory/1992-6-0x0000000000400000-0x0000000000A72000-memory.dmp

    Filesize

    6.4MB

  • memory/2496-1-0x0000000000400000-0x0000000000A72000-memory.dmp

    Filesize

    6.4MB

  • memory/2496-7-0x0000000000400000-0x0000000000A72000-memory.dmp

    Filesize

    6.4MB