Resubmissions

04-10-2024 16:34

241004-t3gplsyfle 10

04-10-2024 15:24

241004-stjl6swapb 10

Analysis

  • max time kernel
    37s
  • max time network
    40s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-10-2024 16:34

General

  • Target

    2024-10-04_15c902908841af230e8935268a0b77d5_wannacry.exe

  • Size

    2.2MB

  • MD5

    15c902908841af230e8935268a0b77d5

  • SHA1

    6da579c12ce1cfc6e4acc67e1a20f31baf786942

  • SHA256

    d9f6ab45e759074024fce2473a8c2cb4da64047ef175b4f6c7aca769ea35d70a

  • SHA512

    11fa0a65304f3b3c65a3a90a3ffd9b011dbb5bfac00bb03a9fab37d429f2700ff2bc2db09e36a0bf3384218b2c3ad7f3e44f84c03e6246de470bfbc08dd2fb7b

  • SSDEEP

    49152:QnuQqMSPbcBVQej/VINRx+TSqTdd1HkQo6SAARdhnvn:QZqPoBhzVaRxcSUZk36SAEdhvn

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Drops file in Windows directory 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_15c902908841af230e8935268a0b77d5_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-04_15c902908841af230e8935268a0b77d5_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2876
  • C:\Users\Admin\AppData\Local\Temp\2024-10-04_15c902908841af230e8935268a0b77d5_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-04_15c902908841af230e8935268a0b77d5_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4504
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1728
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff93ed3cc40,0x7ff93ed3cc4c,0x7ff93ed3cc58
      2⤵
        PID:2924
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1748,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1756 /prefetch:2
        2⤵
          PID:4788
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1396,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
            PID:4792
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1728 /prefetch:8
            2⤵
              PID:3624
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:3564
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3308 /prefetch:1
                2⤵
                  PID:3660
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4444,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4416 /prefetch:8
                  2⤵
                    PID:4188
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3652,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4596 /prefetch:1
                    2⤵
                      PID:4900
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4764 /prefetch:8
                      2⤵
                        PID:852
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4572,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4416 /prefetch:8
                        2⤵
                          PID:2864
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,8734184387484580769,9276524080593876000,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4884 /prefetch:8
                          2⤵
                            PID:1872
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level
                            2⤵
                            • Drops file in Windows directory
                            PID:1540
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff62b144698,0x7ff62b1446a4,0x7ff62b1446b0
                              3⤵
                              • Drops file in Windows directory
                              PID:1736
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:4484
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:4012
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:2856

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\Google\Chrome\Application\SetupMetrics\20241004163521.pma

                                Filesize

                                520B

                                MD5

                                d7bdecbddac6262e516e22a4d6f24f0b

                                SHA1

                                1a633ee43641fa78fbe959d13fa18654fd4a90be

                                SHA256

                                db3be7c6d81b2387c39b32d15c096173022cccee1015571dd3e09f2a69b508a9

                                SHA512

                                1e72db18de776fe264db3052ce9a842c9766a720a9119fc6605f795c36d4c7bf8f77680c5564f36e591368ccd354104a7412f267c4157f04c4926bce51aeeaa1

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                Filesize

                                649B

                                MD5

                                f64b84dfa34ac7d1197651c4120cfece

                                SHA1

                                b8094fc0407dafde0794af873464598f9f61f9a5

                                SHA256

                                02f317f25d0173c38554b36be4848861878b27ed4cfe899c392e3f409d3160b6

                                SHA512

                                ff7788dc6b4aff679dc8118be9d9449b72a363da4b303118884e3b609f8c89af5529f4e785ec7dcf36b38be4480f9f6edd7c48f97219f5732d9fb357516294f6

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                2KB

                                MD5

                                c8109f72fa8ce34417b6b4b29e0f5ede

                                SHA1

                                a9e8ad1755daef6e58cb466e5a9105f355ea36ab

                                SHA256

                                65615224a5871f1ac72920a78418d662c47e09a33a24f85a3c7d66815a69e4bc

                                SHA512

                                e7ef3270bcddc4eb4c2b1ad0d893d7c60e5deb10835e936695e18325bb7fa78ecdcdcedbb1814b5ac3807f70798dde7e6a8cf440ec53cda05a0c137bc8d6ca31

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                Filesize

                                2B

                                MD5

                                d751713988987e9331980363e24189ce

                                SHA1

                                97d170e1550eee4afc0af065b78cda302a97674c

                                SHA256

                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                SHA512

                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                354B

                                MD5

                                9afb60a0662b43a439a5a3c6ee739558

                                SHA1

                                be544d57be973b61dfcff21a01b496e4b93235a8

                                SHA256

                                047558f50c674790aaf4e8f7f1a7b285768a1760c87aa6b003d0dce42cf8db60

                                SHA512

                                fe33b698332f14e85f7ea0bf1c63e0f296358a842e42b6e44aef5c696078b3d7632ef71e2a1a6321021069f9cbc75ff287ddfdea1786732214d110ecc6107705

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                a6d3bbde3572affea06e9e40af3d01c0

                                SHA1

                                60afece2e84dde29f2dbd4951e81dbe2ed343109

                                SHA256

                                0ef0a01c3bb46ad4f2e44617dda66f3e9d4f20925e2eb7e74b5ff44fe38cfcf2

                                SHA512

                                2950e605342f85f77208f8daf6b607532d5cf1ff2f8a428ba0692ef5bd9dfc253363a64403b4f9a2fcd5bf554e8dc346c5c0a4daeaac52923337a0cdf1389053

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                9KB

                                MD5

                                e5c53213f72f93d5a5e7e978a55923ee

                                SHA1

                                c7a3c56a0ec5602c053331842b1c8522c6d68838

                                SHA256

                                fe6c2bb9ed35be964364d6972bcf153a53ab7560cf767f906f43bf4ed6ea587d

                                SHA512

                                70d647ad73cc762e86fd6669dcf1d9114b01b08761556429ffb528baa65dca5d92ffe6228c48c1c178b160c474fb28d45c12a52e2648556cce7ee2715c609dc2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                13KB

                                MD5

                                de83678b86606bb027b946a47e9beff2

                                SHA1

                                54cbb04dd1add89fd8191bb90e792a147d86a2d0

                                SHA256

                                fbd80f46b5f8b8b244b2e7f99d780741fcbee9a88b9c51c3a1babdb87d0130d6

                                SHA512

                                87da5fb6d189e2545b1eb917180b56d7527222a6a8d6eebcc7e0e60f0dde145a912461630e9aa5c97d1e1dc7538e640177f4be7d5f92edea6030e1129c0c701c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                101KB

                                MD5

                                da9cfa0b1cd01f0748d9ab9337130891

                                SHA1

                                e9097b625a03c5fbd1850101d2c6d7bdf5a0a9bc

                                SHA256

                                a96ef81e8ef8f58a3b2a01f61d8b15fc13a6a10c84c0ee1bfa7563f4f651fe53

                                SHA512

                                8c4b4f53654a955a0a401de71310308207069d978255781f63fc69013affb5839b9912df7ca1b8a46254b05df94d78be61e99db78e9db743e7ce264b97cc8669

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                213KB

                                MD5

                                fc39439fb6909f36cdd13cfd0c50313a

                                SHA1

                                79967b361ab776df82a4b2c555a84f4b648025ad

                                SHA256

                                8f5d41ef52426d6d0d742764633949a851d027aa42f4aad9a62fd1b0f2215502

                                SHA512

                                ddee92826d5112b0c32099080b5ad27e51e411a3e17816dfe5491bbf10b6c827b22d54213fb35756a536999d9b7a43430bcc77c43654b61fc4fdbf9a47864ce7

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                213KB

                                MD5

                                a0d21591823f16c28b23b4bc168e227a

                                SHA1

                                975d985357d61e6e4dd354f820e57aafff76f867

                                SHA256

                                1952fa95972550fd209831652dc343ce984854fa539c379a87e5525bb814ee51

                                SHA512

                                f8dd8d6c0e4e2a9a658c0a2ec6232b03d8ec226469d53ffdabe9e69a7a687aca89b66d02c7bd70e8db05615417e505fb4f8194edb77bf65dbece34df672ed4c9

                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                Filesize

                                10KB

                                MD5

                                2bf8b49ae726b6251ed4b98c8bde132e

                                SHA1

                                5e5b4f295fec6133c97b3a2b9b313e1504177e6b

                                SHA256

                                39e0a94897e8550f2f35ea74bf31a0c49173ce6586a1a89465e771302714e83b

                                SHA512

                                0d1d7752934de65768c01269eee5b96cbb2aba4a56a750bf5df7da55f14784e0513d642aad8e01c2fc47cd7c106f86d6b277e8aee3744221e10468d38a9d8844

                              • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                Filesize

                                10KB

                                MD5

                                d12e797f18cb79137ad12b5e5139e1b8

                                SHA1

                                f15fb437b1be86b714e278ce927b315fa0e16ea3

                                SHA256

                                afb0f4a0229174f8118ab512b569fdb9eb3ebb0389cb11c9f4a0a2aa88ec258b

                                SHA512

                                f6e8f99bcd0ecff7683c8e56fa2ffa3fdff16d6c17a2066b36bc3d78e2838130b5b23059a239b29a7ebdd0b5ca36b3f9cf388945bf1aad50a3f91cb8091223cd