Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 10:59

General

  • Target

    2024-10-28_c5f54d50773618dbfc34f234c86d8b7e_wannacry.exe

  • Size

    5.0MB

  • MD5

    c5f54d50773618dbfc34f234c86d8b7e

  • SHA1

    cee1cf8b0be1fde8e46825166a2226826dd4c63e

  • SHA256

    beb70ad86f877107e7a14d3e65f1ae07c4c77f6c18ed62faa73169a089df8c0a

  • SHA512

    5c6a822b622f2fa2f912bd275819ae3bc2a6ae5a8f9677cd45f7bdd02592db1ed6749a170262962b1289c788b0f39da8657423226fb83f61bc5ff54e9a61793c

  • SSDEEP

    49152:QnpEKUacBVQej/1INJx+TSqTdX1HkQo6SAARdhnv:QpyfBhz1aJxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3000) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-28_c5f54d50773618dbfc34f234c86d8b7e_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-28_c5f54d50773618dbfc34f234c86d8b7e_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:2796
  • C:\Users\Admin\AppData\Local\Temp\2024-10-28_c5f54d50773618dbfc34f234c86d8b7e_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-10-28_c5f54d50773618dbfc34f234c86d8b7e_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    2.0MB

    MD5

    b97c4cc79c438fc0b49b30e5402763d8

    SHA1

    8e313b4b82545597fc9fa4997bd450824371e57d

    SHA256

    f4ff7d973f0d3e2a88435f79ed3a1f8a64550dc2c54e593331f893d08b179e2b

    SHA512

    fe25be280c06ca3eb621903b6dd834d05e25ef9d7fa8495b8c91e14dc90d21321aefea5e8110865cc628635ce39c276a73778ed897ae97f3f2d7dcd2d0ae7f88