Resubmissions

12-12-2024 17:27

241212-v1e9fatjgl 10

12-12-2024 00:28

241212-asebystpas 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 00:28

General

  • Target

    2024-12-12_7bb44ce91d465a2a5295f9168e0b6970_wannacry.exe

  • Size

    3.6MB

  • MD5

    7bb44ce91d465a2a5295f9168e0b6970

  • SHA1

    50678187f149f1e46a738a166c0026ac05bc4a0a

  • SHA256

    a5ffdb6d6251b69c518c7e4fa71feeb9b2efadec74d1f4c578890536eec1124d

  • SHA512

    71c071a8cf2398c4a1fc34fa9c447b893dfe59465f15d392e3724a58bf8bb835aede6e72431e024bb610daa70a819aa65b8107f4301757ed9b75a89d1e972557

  • SSDEEP

    49152:2nAQqMSPbcBVJNRx+TSqTdX1HkQo6SAARdhnvxJM0H9:yDqPoBJRxcSUDk36SAEdhvxWa9

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3298) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_7bb44ce91d465a2a5295f9168e0b6970_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-12_7bb44ce91d465a2a5295f9168e0b6970_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2512
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2236
  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_7bb44ce91d465a2a5295f9168e0b6970_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-12_7bb44ce91d465a2a5295f9168e0b6970_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    5c2a5c8233d0013014a1eec1d2ce47cc

    SHA1

    4f6abf67c5b9ea8f2ba053a6276095ecf3329bc9

    SHA256

    ffae568b8df0e4ade5db934ac902d742f92fe40426306970d8b2080516ab327e

    SHA512

    6684911c57a8e861c03d569b1c6ed4a18efb74595cd8706195b1aae583d19d05270a597234637a0abb74f34df5842b66dd50803c3365b78d57bc94a8e3145c9d