Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe
-
Size
5.0MB
-
MD5
f8adb09635e5e07e0080b5cf9866aca6
-
SHA1
fc4466269f240f855eac6a335fdd1b76c1af6d49
-
SHA256
a1f59222072512ac0fa9e2be60e3fff9903b30ce774622adc37175e7cd036396
-
SHA512
2e27fe312c0e1f2899c7e0b4d97c477f66307e835dff5f8ab362f701268fc104c3c5c1db46225ea010f65001818adbe43216fb01d71f975a3b2d00d5305c7ecb
-
SSDEEP
24576:nbLgdeQhID8kIqRYoAdNLKz6626M+vbOSSqTPVXmiHkQg6eX6SASk+RdhAdmv:nnjQS1INRx+TSqTdX1HkQo6SAARdhnv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3378) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
pid Process 1316 tasksche.exe 3724 tasksche.exe 3200 tasksche.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2220 icacls.exe 4900 icacls.exe 3536 icacls.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1316 3196 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 84 PID 3196 wrote to memory of 1316 3196 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 84 PID 3196 wrote to memory of 1316 3196 2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe 84 PID 2040 wrote to memory of 3724 2040 cmd.exe 86 PID 2040 wrote to memory of 3724 2040 cmd.exe 86 PID 2040 wrote to memory of 3724 2040 cmd.exe 86 PID 3724 wrote to memory of 1076 3724 tasksche.exe 87 PID 3724 wrote to memory of 1076 3724 tasksche.exe 87 PID 3724 wrote to memory of 1076 3724 tasksche.exe 87 PID 3724 wrote to memory of 2220 3724 tasksche.exe 88 PID 3724 wrote to memory of 2220 3724 tasksche.exe 88 PID 3724 wrote to memory of 2220 3724 tasksche.exe 88 PID 1316 wrote to memory of 3200 1316 tasksche.exe 107 PID 1316 wrote to memory of 3200 1316 tasksche.exe 107 PID 1316 wrote to memory of 3200 1316 tasksche.exe 107 PID 3200 wrote to memory of 1936 3200 tasksche.exe 108 PID 3200 wrote to memory of 1936 3200 tasksche.exe 108 PID 3200 wrote to memory of 1936 3200 tasksche.exe 108 PID 3200 wrote to memory of 4900 3200 tasksche.exe 109 PID 3200 wrote to memory of 4900 3200 tasksche.exe 109 PID 3200 wrote to memory of 4900 3200 tasksche.exe 109 PID 1316 wrote to memory of 928 1316 tasksche.exe 112 PID 1316 wrote to memory of 928 1316 tasksche.exe 112 PID 1316 wrote to memory of 928 1316 tasksche.exe 112 PID 1316 wrote to memory of 3536 1316 tasksche.exe 113 PID 1316 wrote to memory of 3536 1316 tasksche.exe 113 PID 1316 wrote to memory of 3536 1316 tasksche.exe 113 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 1076 attrib.exe 1936 attrib.exe 928 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\ProgramData\nzfbkoaczl750\tasksche.exeC:\ProgramData\nzfbkoaczl750\tasksche.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\attrib.exeattrib +h .4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1936
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:928
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3536
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-07_f8adb09635e5e07e0080b5cf9866aca6_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:4776
-
C:\Windows\system32\cmd.execmd.exe /c "C:\ProgramData\nzfbkoaczl750\tasksche.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\ProgramData\nzfbkoaczl750\tasksche.exeC:\ProgramData\nzfbkoaczl750\tasksche.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1076
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD56565f12e33a2180f0307d9d9308cb966
SHA18b9df1051510648869efe36ea2aeb3e0ef6c7a2f
SHA256f14d849afa93240eb3abfe8bf41c7496e9fa2dffe5598b4d04296a0729c8f904
SHA512aebab109711494e6cc6802d50e7d66e79df05c876722832f935275544df630eba01be5f16091a39bed173945435fcaf5d97e8be8ea137273f723a59f9741346f