Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe
-
Size
3.6MB
-
MD5
4add0c33ad97fba562074edafe69c77a
-
SHA1
b77403a1db59372eeb6ca386c8d735c8cb7b2ef2
-
SHA256
2aa344bde06d1dafbff2915927b03c39502fcfd32d92f915d4f4917c98394191
-
SHA512
5554d4495717ac82c41861a249cecebd04e128dbe2fab67eb7e539fe4a4b27086b0729415fcd069ce3474e9763aa9235110e78693c3d3c12d300f57a00348ba9
-
SSDEEP
24576:XbLgdeQhfdmMSirYbcMNgef0QeQjG/D8kIqRYoAdNLKz6626M+vbOSSqTPVXXJTs:XnjQqMSPbcBVQej/1INRx+TSqTdX5nI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3148) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2396 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1952 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-10-12_4add0c33ad97fba562074edafe69c77a_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5e3dfed861e9aea0ec25cc620ac93b219
SHA18b09291acebeea1f0efd793cc5bcc1e9db83e810
SHA2566a95c6133a749c770bfd1e4fd0de5ad804252befd8111e082458e633db621ea2
SHA51215180ec271c79bc21e9c354a4afe4fff47dc6f676e8876aec1c892f144f17515e3b05a1554ecbe62344842974654aee748f6ba4b77e0ba143803b6cd954b8fc5