Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 12:32

General

  • Target

    2024-12-01_aa5b407f77eb30e9584b4670ac4604d4_wannacry.exe

  • Size

    5.0MB

  • MD5

    aa5b407f77eb30e9584b4670ac4604d4

  • SHA1

    b403708856b662c687f65cd819165a37468ab763

  • SHA256

    86bc73d7005d35907da21802c16ff60365e223ff79b201bba87215236f7bae2e

  • SHA512

    181e3b283ca5eaadaf6e105aed6f2907f4da4c11e920b09fc34d9e7c3a0d9c213db9c018da089e224891be83e97b3bcf2fe59a38b549bdeca57e62d90cbd314e

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0H9GAMEcaEa:yDqPoBhz1aRxcSUDk36SAEdhvxWa9G5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3328) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-01_aa5b407f77eb30e9584b4670ac4604d4_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-01_aa5b407f77eb30e9584b4670ac4604d4_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2816
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2012
  • C:\Users\Admin\AppData\Local\Temp\2024-12-01_aa5b407f77eb30e9584b4670ac4604d4_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-01_aa5b407f77eb30e9584b4670ac4604d4_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    44f9296cc38e6967558f943967f4d6fe

    SHA1

    98b268fed5d57b6fdca5bf9e77d78b50695b1913

    SHA256

    a74dbf89ab86c4e52715599e1cc8fd454c460070567a05a31a192004b36efcf8

    SHA512

    29a1148ae6f72f7b7b528ed5efc7c79f52a4be496904e64b327f0b369ec81e6721c07a66a57259e1b5236b70ed59b21643f31f12343e1b9726eff68faf9b1d1d