Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
-
Size
5.0MB
-
MD5
f8adb09635e5e07e0080b5cf9866aca6
-
SHA1
fc4466269f240f855eac6a335fdd1b76c1af6d49
-
SHA256
a1f59222072512ac0fa9e2be60e3fff9903b30ce774622adc37175e7cd036396
-
SHA512
2e27fe312c0e1f2899c7e0b4d97c477f66307e835dff5f8ab362f701268fc104c3c5c1db46225ea010f65001818adbe43216fb01d71f975a3b2d00d5305c7ecb
-
SSDEEP
24576:nbLgdeQhID8kIqRYoAdNLKz6626M+vbOSSqTPVXmiHkQg6eX6SASk+RdhAdmv:nnjQS1INRx+TSqTdX1HkQo6SAARdhnv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3295) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1612 tasksche.exe 2264 tasksche.exe 2288 tasksche.exe -
Loads dropped DLL 1 IoCs
pid Process 1612 tasksche.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1984 icacls.exe 3068 icacls.exe 1608 icacls.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2264 tasksche.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1612 2320 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 29 PID 2320 wrote to memory of 1612 2320 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 29 PID 2320 wrote to memory of 1612 2320 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 29 PID 2320 wrote to memory of 1612 2320 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 29 PID 328 wrote to memory of 2264 328 cmd.exe 31 PID 328 wrote to memory of 2264 328 cmd.exe 31 PID 328 wrote to memory of 2264 328 cmd.exe 31 PID 328 wrote to memory of 2264 328 cmd.exe 31 PID 2264 wrote to memory of 2292 2264 tasksche.exe 32 PID 2264 wrote to memory of 2292 2264 tasksche.exe 32 PID 2264 wrote to memory of 2292 2264 tasksche.exe 32 PID 2264 wrote to memory of 2292 2264 tasksche.exe 32 PID 2264 wrote to memory of 1984 2264 tasksche.exe 35 PID 2264 wrote to memory of 1984 2264 tasksche.exe 35 PID 2264 wrote to memory of 1984 2264 tasksche.exe 35 PID 2264 wrote to memory of 1984 2264 tasksche.exe 35 PID 1612 wrote to memory of 2288 1612 tasksche.exe 38 PID 1612 wrote to memory of 2288 1612 tasksche.exe 38 PID 1612 wrote to memory of 2288 1612 tasksche.exe 38 PID 1612 wrote to memory of 2288 1612 tasksche.exe 38 PID 2288 wrote to memory of 2868 2288 tasksche.exe 39 PID 2288 wrote to memory of 2868 2288 tasksche.exe 39 PID 2288 wrote to memory of 2868 2288 tasksche.exe 39 PID 2288 wrote to memory of 2868 2288 tasksche.exe 39 PID 2288 wrote to memory of 3068 2288 tasksche.exe 40 PID 2288 wrote to memory of 3068 2288 tasksche.exe 40 PID 2288 wrote to memory of 3068 2288 tasksche.exe 40 PID 2288 wrote to memory of 3068 2288 tasksche.exe 40 PID 1612 wrote to memory of 2312 1612 tasksche.exe 43 PID 1612 wrote to memory of 2312 1612 tasksche.exe 43 PID 1612 wrote to memory of 2312 1612 tasksche.exe 43 PID 1612 wrote to memory of 2312 1612 tasksche.exe 43 PID 1612 wrote to memory of 1608 1612 tasksche.exe 44 PID 1612 wrote to memory of 1608 1612 tasksche.exe 44 PID 1612 wrote to memory of 1608 1612 tasksche.exe 44 PID 1612 wrote to memory of 1608 1612 tasksche.exe 44 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2292 attrib.exe 2868 attrib.exe 2312 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\ProgramData\lxejlrdtqen920\tasksche.exeC:\ProgramData\lxejlrdtqen920\tasksche.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2868
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2312
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2244
-
C:\Windows\system32\cmd.execmd.exe /c "C:\ProgramData\lxejlrdtqen920\tasksche.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:328 -
C:\ProgramData\lxejlrdtqen920\tasksche.exeC:\ProgramData\lxejlrdtqen920\tasksche.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2292
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1984
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD56565f12e33a2180f0307d9d9308cb966
SHA18b9df1051510648869efe36ea2aeb3e0ef6c7a2f
SHA256f14d849afa93240eb3abfe8bf41c7496e9fa2dffe5598b4d04296a0729c8f904
SHA512aebab109711494e6cc6802d50e7d66e79df05c876722832f935275544df630eba01be5f16091a39bed173945435fcaf5d97e8be8ea137273f723a59f9741346f