Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 03:43

General

  • Target

    2024-10-13_130d4295c576b7b42ec681b662c99694_wannacry.exe

  • Size

    3.8MB

  • MD5

    130d4295c576b7b42ec681b662c99694

  • SHA1

    91343e5ba6705200dd5248bc24e4303b68bd392f

  • SHA256

    b80d0f1b1dad7df34152bf573234a904bdbb220dff01f4f8ff08c4129135f7f5

  • SHA512

    3e9a24d9b1e54e363543a72f4dd0f82f5616334d638ebe0938abc1cdb14d030a8293659f56bf532b0f8c182d27cdb21eedf303f92f321462479bd0f705ada922

  • SSDEEP

    49152:unsEKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhnvziHgYk6:asyfBhz1aRxcSUDk36SAEdhvziHgYk

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (2421) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Drivers directory 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_130d4295c576b7b42ec681b662c99694_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-13_130d4295c576b7b42ec681b662c99694_wannacry.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\CTFMON.EXE
      C:\Windows\CTFMON.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4416
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1568
  • C:\Users\Admin\AppData\Local\Temp\2024-10-13_130d4295c576b7b42ec681b662c99694_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-13_130d4295c576b7b42ec681b662c99694_wannacry.exe -m security
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\BIT9A4D.tmp

          Filesize

          1.8MB

          MD5

          b64a91e02fd329d17171a76b72d37f7b

          SHA1

          4e35b7839be10f0f65ea6b42bcbc4fcb64d55c6a

          SHA256

          10fefd4da420c9a13516b40ce59fe0d199aae42aaa78d642fdd673da5732529b

          SHA512

          30d952721681c136747e6f3335d9ed815a91b5bbfeaac2cc254e8376c82092e676b9a093404bb91a2e0672328501342f2fe2548ad4228357e96b93b24e84112a

        • C:\Users\Admin\AppData\Local\Temp\wctC013.tmp

          Filesize

          40.4MB

          MD5

          ba3996984e246de79b2e61b63223be93

          SHA1

          2174ba96d90409cdfdfe009dc8081b328da94305

          SHA256

          ea85da8ae58297782d0a40683f2c0ea2bc5080b0607b97e7d0ef694134ededfd

          SHA512

          91dda735ce10bd9ef5c47bea13e887eedaa8a3252bed160f7246403a27ad2be7bb11e6be00ae637df2c92ec2a5fbb2179d460a8c3152be793c6952d22827fd6f

        • C:\Windows\CTFMON.EXE

          Filesize

          255KB

          MD5

          5a6592ad7789edcd2dd90484c18b6d32

          SHA1

          aeb8550a7fa6d4c1eacb684798efb0b7f3adc2b4

          SHA256

          95a6b1d8bd819c966df0ba025923f15ea2a9be0c17f14420e49095b3d403af74

          SHA512

          76044079696d050974e70b482ec3be1f5bdcb714abf015236199b9a703cac69ef576b4cda6185cfed8a41a8a9670629e4015516ac2b64f10a41b2865b2b9dab3

        • C:\Windows\SysWOW64\drivers\npf.sys

          Filesize

          29KB

          MD5

          5c14de7d04d00aac3f03b569f2ea4664

          SHA1

          a26ae78a204791548be000824a1ad05524bdd2e8

          SHA256

          fac5bcebde87a261b4fb5a110765e53c96f0ef27b24ca94762f2c2ddb4da4204

          SHA512

          4bcbc4f0ab7b52f4303206fafd9d0bafea02bb25d8395a80eb6390b30ccc750379fb7fe9e0bf5a4a025cedb9e4702b7655963e360f2f983526dbc2e1efaa814f

        • C:\Windows\packet.dll

          Filesize

          32KB

          MD5

          f46c27d67c0ce202ebf4b771cb56ec00

          SHA1

          f999454d0aaabccfda7a50c8cb0818e50a7a1d91

          SHA256

          a68c877cd9c7562c66c722b4d0cd9fa366c65465d4c47ab63bf28bd5f1a69bcc

          SHA512

          2b7c6f7e865f88625a05c85226a95319656648029ef1c1b92b3a6c2dea7a4f7cf7d157c09af32c8689c76c6247852cd5af72d4f0dbb4dbcc3fe3c24681d53dbf

        • C:\Windows\pthreadvc.dll

          Filesize

          24KB

          MD5

          ea20ca545a351384486cef574b7a5571

          SHA1

          a1f01df09df62e933e4ff289361641b06ff31548

          SHA256

          2bd8d9dd8739e17828f8a87b73d592d4fd17988bbb0ea4a4d4cbda57129e8e48

          SHA512

          64b3dee275fb1830254fa2a95778b26864708c0b5e348cf5919ded013cda3872fe26304c846fa7968b24f60e2b6105c4813ff9e695bd6bb52897318cdecd382b

        • C:\Windows\tasksche.exe

          Filesize

          2.0MB

          MD5

          beb8a27fc024962e045c32aa58d07d0e

          SHA1

          796d3613673f323135865c42272abef347add163

          SHA256

          ea2ad4d3bb98673b88e18eea1bf06c371c206b64246a9193b2a64ba4fe4f4900

          SHA512

          e84c03f6f4399b28e0d258b743831f36c621325d9b199cbbdd6982ed51280facfc5a953a2393788bbc54efb653f95c9f75ea29c93c147c9227aff3395f788179

        • C:\Windows\wpcap.dll

          Filesize

          117KB

          MD5

          6d79c447d16b96e7a72b12e450b6fa8e

          SHA1

          d2afa5eb9c9ba598f82a6025c1a07d31cb8a30bb

          SHA256

          afe533c6990520d49a4963bb9ce6d563b02d7b299ff4a9c9e4bca31ca6920deb

          SHA512

          6b96c6e79608256807f37a4b74b264074274642b4e4e09ef870d13246b7706582535c1e4f33f2a61281ab4c0ef59fc03c60a54faa6627aee92df52f356b8d966

        • memory/1488-63-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-58-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-99-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-93-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-94-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-43-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-83-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-78-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1488-73-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1932-0-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1932-51-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/1932-26-0x0000000000400000-0x0000000000AA7000-memory.dmp

          Filesize

          6.7MB

        • memory/4416-21-0x0000000010000000-0x0000000010012000-memory.dmp

          Filesize

          72KB

        • memory/4416-12-0x0000000000400000-0x000000000048F000-memory.dmp

          Filesize

          572KB

        • memory/4416-23-0x0000000002150000-0x000000000218E000-memory.dmp

          Filesize

          248KB

        • memory/4416-27-0x0000000000400000-0x000000000048F000-memory.dmp

          Filesize

          572KB

        • memory/4416-24-0x0000000002190000-0x00000000021A0000-memory.dmp

          Filesize

          64KB