Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 16:56

General

  • Target

    93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174N.exe

  • Size

    3.6MB

  • MD5

    0ae789d084faa747a39862531340fcd0

  • SHA1

    aa376c6bd968ab0d94352fa12e8774675ee1ad9d

  • SHA256

    93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174

  • SHA512

    2c84e7b3f61a21dc5ced4cdf426ea8735d1fece4e762ad8e44f36eff0acf14a7e2201e95a3fe18960b36897ded55c8017bb65da809f60be3b0d1caa91696528a

  • SSDEEP

    49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAAO:Z8qPoBhz1aRxcSUDk36SAB

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3189) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174N.exe
    "C:\Users\Admin\AppData\Local\Temp\93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2000
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:3852
  • C:\Users\Admin\AppData\Local\Temp\93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174N.exe
    C:\Users\Admin\AppData\Local\Temp\93128033bba0937240ff448cf4c9e2539e6d3121e47bb5e5fde96af366a8b174N.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    6f2bd32689626b6631b6765b6a642e2a

    SHA1

    fb45bb3f848c3dd6e56a2c45deff2a348598d66f

    SHA256

    a7ac42076425bb1aea91f463828ad4e3a6fe82563d2fafbc32f22b93f0dde288

    SHA512

    c2057f48d75f89814be1d23da71554d03bbbb315e97288013b4b98181739a5c43b2475177d1a40bf425ba472d19bf15c30213464c361e618bc3c7cd79054ddc2