Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 15:43

General

  • Target

    2024-11-16_d8fc95d63a5d4e8a413e187321561f16_wannacry.exe

  • Size

    5.0MB

  • MD5

    d8fc95d63a5d4e8a413e187321561f16

  • SHA1

    c7e9be664f768d073e36964d0807ed3936fbbb24

  • SHA256

    ce87862629dc6205e829620806edab7daccfb5bf4b007f5f0d9906d2ff464aa3

  • SHA512

    c45a21f21b0f07e2409fd8d9df79f8090803f4499746893c2447a4a0f29a5c96a3c30acb1a0f511c1cada785d87cf6382378ebb84e37cf59b4d1f362e7e98c4e

  • SSDEEP

    49152:QnpEfPbcBVQej/1INRx+TSqTdX1HkQo6SAARdh:QpUoBhz1aRxcSUDk36SAEdh

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3300) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-16_d8fc95d63a5d4e8a413e187321561f16_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-16_d8fc95d63a5d4e8a413e187321561f16_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4312
  • C:\Users\Admin\AppData\Local\Temp\2024-11-16_d8fc95d63a5d4e8a413e187321561f16_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-11-16_d8fc95d63a5d4e8a413e187321561f16_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    2.0MB

    MD5

    3f3fa80dd1990eb3dec6a868e60aec5a

    SHA1

    ff77ba4664027c12a766519b99c42c39a86adb41

    SHA256

    1eccb34fb0c6ead5ed10352e02f28068f1cc135b3a11d1a351f09a145e4d6ef1

    SHA512

    782f7f8622953a0af416ca56b588f25ac07ec0e1440628255f8ce0ac3f6e99c3e9df21c5c854b09db8a7bd5ae45314c93e032c6ca36b173cc8dd180d16a9756c