Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 04:08
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe
-
Size
2.2MB
-
MD5
df6e782ef7a6ee2bd3c553bef4eb6ef6
-
SHA1
11613289ef9fa452b30367e14bfe5ca779f0c360
-
SHA256
33ba228218c72190177f4cf91d8f0bb54b787f5d0b88f0145b90224a0cbd64fe
-
SHA512
2b4714a222144d0eb48d1734323375d88f1cd84e08be83fa141db8cd37d744ee0fe96f145535d415257c3a5635dd891ae183adce6d3e009243eff3de3817870e
-
SSDEEP
24576:QbLgurikfEcQdhirYbcMNgef0QeQjG/D8pdhAd:QnVEhPbcBVQej/Mdh
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (3166) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2560 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\H8MBZQNW.txt 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\H8MBZQNW.txt 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\TPAA3HZS.txt 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\TPAA3HZS.txt 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2560 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-be-0b-22-a5-84 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6}\ce-be-0b-22-a5-84 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-be-0b-22-a5-84\WpadDecision = "0" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6}\WpadDecisionTime = 901d41665c1cdb01 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6}\WpadDecision = "0" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6}\WpadNetworkName = "Network 3" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-be-0b-22-a5-84\WpadDecisionReason = "1" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6}\WpadDecisionReason = "1" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0172000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{BB91B94E-CF2E-413F-860C-58A0285FC2B6} 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-be-0b-22-a5-84\WpadDecisionTime = 901d41665c1cdb01 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2104 wrote to memory of 2560 2104 2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe 31 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32 PID 2560 wrote to memory of 2772 2560 tasksche.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 2243⤵
- Program crash
PID:2772
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-10-12_df6e782ef7a6ee2bd3c553bef4eb6ef6_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5faf780c7b2535b7537187852314a2258
SHA1d1c9bf1aa3c04e364198a9510663aef3a822349e
SHA256f9104411be846a760133af6a8830676b0571b0e865da717ff14bb0608a229c42
SHA51294ffe3240750f7061359c861aaac75004a0ceef282c0f2c1234654d8f6d4dbd92f96c87e65cf716a678d9891a051a2409c739a4fd330b7536b917f76c2dd6a2a