Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 15:29

General

  • Target

    2024-11-16_43cd2920adc427903e5bf41417b00c46_wannacry.exe

  • Size

    5.0MB

  • MD5

    43cd2920adc427903e5bf41417b00c46

  • SHA1

    9493b0094207ac877e1f6d650d344309a97f4b39

  • SHA256

    9f1c2fb39d7ce553e82136d03ab32a44959b3eae90636809d8a6e1d152a7dfdf

  • SHA512

    e9b554171d58bfca64b8e09ec3ff9f3fb9122432910e3ccc151229dd85fc6c346eb4763351fd4e8abd71fd83d8410e3eef5970236176fb75c10cb40cb151d7dd

  • SSDEEP

    98304:yDqPoBhz1aRxcSUDkEQv9Snm1tnr7DRbxyE1C:yDqPe1CxcxkEQv9Snm1tnr7DRbxyE1C

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3210) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-16_43cd2920adc427903e5bf41417b00c46_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-16_43cd2920adc427903e5bf41417b00c46_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:228
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1912
  • C:\Users\Admin\AppData\Local\Temp\2024-11-16_43cd2920adc427903e5bf41417b00c46_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-11-16_43cd2920adc427903e5bf41417b00c46_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    870785dd771aca30d471463a39fe9fd6

    SHA1

    761e63ef82455e69040a6c818c4b862be883b1a2

    SHA256

    e633a98681e21bfaba8be3a12aa2f98d67304a312e824b01939fc6979c6aae28

    SHA512

    aa2da48179dfe563007f7bcaaea145779c9538e6ea33d03f6eeb993fb226af5fea11e19c089b9b1448064c2369ad1bcb329a44147815759ae9ead66e4edf29cd