Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14-10-2024 00:42

General

  • Target

    2024-10-14_b0352d239f362fb1a66f0bf9143dc90c_wannacry.exe

  • Size

    3.6MB

  • MD5

    b0352d239f362fb1a66f0bf9143dc90c

  • SHA1

    91638c8d7f90f5781c553dba5f0333af40054c51

  • SHA256

    159241c3ab9e4565a1e3a18dbec6c3696e9d408df9d72377a3d49390a3acd520

  • SHA512

    718f9e128f475030dee2cb29b20d5f5dc213683876e59737dc10334187e72ec9a79022d895a5fb7ec4b4ad6af07f64a1f68f3951654259cd0ee05bd0c18fbbfb

  • SSDEEP

    49152:2nAQqMSPbcBVKAMEcaEau3R8yAH1plAHI:yDqPoBs593R8yAVp2HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Contacts a large (3240) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_b0352d239f362fb1a66f0bf9143dc90c_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-14_b0352d239f362fb1a66f0bf9143dc90c_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2412
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2160
  • C:\Users\Admin\AppData\Local\Temp\2024-10-14_b0352d239f362fb1a66f0bf9143dc90c_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-14_b0352d239f362fb1a66f0bf9143dc90c_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    41011b221226c1c08822fa4145541edd

    SHA1

    b9d7cb7512a167f4e419be65706a2833cc0e59a6

    SHA256

    9c976244798e098c1bec637ab2fd23e0b71b53f85bb02a31b1c61b8f88a24e3f

    SHA512

    2bcc61e4cdac343db1ff54cabb29ed4d3e38e83eb79ef345a381ce72e34165708e3db04b45992bea215558460d21452ed5b41fb38a92bfb448cbade7887afd8b