Analysis
-
max time kernel
61s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20240611-es -
resource tags
arch:x64arch:x86image:win10-20240611-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
04-10-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
wannacry.exe
Resource
win10-20240611-es
General
-
Target
wannacry.exe
-
Size
276KB
-
MD5
14131d9a5de9dd62ccc53a05d60b1a15
-
SHA1
c3309c4598bfe98d6e52cc93b19d2876eaccc538
-
SHA256
f60d07422a50e62bf3b92ab406b83b26fcd203a1e77ae2a9a6c239766f65eb8f
-
SHA512
ea5e1a8d3cff14bd5fbdacfa724a5e7142866b7595621adc254fb5ce1bf7e86c1b23e13b44e902299729e3dccccc4b02aabee5f05490fccfc006c39ee19da3be
-
SSDEEP
6144:HE9l9yeqIYVTH5DgSg8ajldktM0XXrEhypyhqHBuDp0Nc8Qs:HVbLgPluEhq0Dp
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (829) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4004 tasksche.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wannacry.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wannacry.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4004 tasksche.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4004 4016 wannacry.exe 72 PID 4016 wrote to memory of 4004 4016 wannacry.exe 72 PID 4016 wrote to memory of 4004 4016 wannacry.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\wannacry.exe"C:\Users\Admin\AppData\Local\Temp\wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\wannacry.exeC:\Users\Admin\AppData\Local\Temp\wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4820
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f40217f39f426447598ae6f25e63a1fc
SHA1b4191bbffba1ffdcc65d4baf7f90ab4650e8d823
SHA25693b36942c6e1f89a7b3a040f5f79bba6d0ff44b0c2e3d1baed84e41faa503d8c
SHA5126b5c2bf689b9c89c8ed92bfa1743081fdcdafaa28394964218ac3340984cc3247e67d56a9eb2a60df007a013a129d6c2f87328860ac983dee191d6adfbbdddf1