Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 09:52

General

  • Target

    2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe

  • Size

    5.0MB

  • MD5

    4be0b1204894ac68869907044a41bf2c

  • SHA1

    7277c8cb366a89df5aa999a412ab44d3e15a4228

  • SHA256

    2422b81785fda3d01c6cd551f93f1b5c17e4929ebfec6a84448ab29ea265c88e

  • SHA512

    ae715d905628ef867e2b2d794162bd9912e8f8fbc5a751859e4c628cb650428cbd47e743cd1e1be38334aeb337ca00b9c8b155538d139a3a5aabb945bf8067c7

  • SSDEEP

    49152:2nAQqMSPbchVQeD/1INRx+TSqTdX1HEQo6SAg9kXJhoq9zlLM:yDqPohhT1aRxcSUDE36SA2Whoq9zlLM

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3283) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2096
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4512
  • C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-03_4be0b1204894ac68869907044a41bf2c_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4984
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4424,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4396 /prefetch:8
    1⤵
      PID:2996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      aaf5cb4443cb81a8a472b8827ee8fc5f

      SHA1

      59b8ed93233d5664564ba9f48825e79c7a4f2da1

      SHA256

      2f8a8221a5b4747eaf7c8a7a581cd257d9c4ee65d52586b81236e61cfb6b5d04

      SHA512

      80ca129048b87ae3a51e99712583a314cafed82dafc86836522b118717860a878f12d5e581b56b46bc8af9825bf0d74619c8bb589fc5cb48568ddfaf06fa6f4b