Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 09:52

General

  • Target

    2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe

  • Size

    5.0MB

  • MD5

    4be0b1204894ac68869907044a41bf2c

  • SHA1

    7277c8cb366a89df5aa999a412ab44d3e15a4228

  • SHA256

    2422b81785fda3d01c6cd551f93f1b5c17e4929ebfec6a84448ab29ea265c88e

  • SHA512

    ae715d905628ef867e2b2d794162bd9912e8f8fbc5a751859e4c628cb650428cbd47e743cd1e1be38334aeb337ca00b9c8b155538d139a3a5aabb945bf8067c7

  • SSDEEP

    49152:2nAQqMSPbchVQeD/1INRx+TSqTdX1HEQo6SAg9kXJhoq9zlLM:yDqPohhT1aRxcSUDE36SA2Whoq9zlLM

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3258) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2532
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2244
  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    aaf5cb4443cb81a8a472b8827ee8fc5f

    SHA1

    59b8ed93233d5664564ba9f48825e79c7a4f2da1

    SHA256

    2f8a8221a5b4747eaf7c8a7a581cd257d9c4ee65d52586b81236e61cfb6b5d04

    SHA512

    80ca129048b87ae3a51e99712583a314cafed82dafc86836522b118717860a878f12d5e581b56b46bc8af9825bf0d74619c8bb589fc5cb48568ddfaf06fa6f4b