Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe
-
Size
3.6MB
-
MD5
7421effaa49f120c8beea4f9936d87d8
-
SHA1
9463f656544132b9fb16235ed5977b7c5394f7ce
-
SHA256
85302b209ba37ac7483d9c015e850562af91a60f9577db5830b607104f328726
-
SHA512
eef29f37e6336c9a5379fa4bce6067ec0e7747d4f944317220e34df3eb29c4e6c48869400401ff1a3c926a39700244ad46b90742cafa72fbc9d302fb2d2c113d
-
SSDEEP
98304:ZDqPoBhz1aRxcSUDkWx7QY83EKx1eKOCXcn:ZDqPe1CxcxkA7j83PxISXcn
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3169) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 1472 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3652 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-10-12_7421effaa49f120c8beea4f9936d87d8_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD523a7477cfc59a613471d698c46ca7345
SHA1b8ee0366e853acd48a27ded7ad5c834ecf6f1927
SHA256e4f4d5272f442d7abee7bd9bfd478766e7a81afc2f4959edbe61f60136cb2a24
SHA5129693e5f2cd4f563589479b768b98011b6768b8dcfc897479ba4010caff60c634e50c772b0dcfeefe13f41c0b015e48f74d8ebd2c6a0b4e30202d7047acbd5358