Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 11:54

General

  • Target

    2024-12-12_bd06e9e94fe3e88b8ea894f1b7bb5f2b_wannacry.exe

  • Size

    5.0MB

  • MD5

    bd06e9e94fe3e88b8ea894f1b7bb5f2b

  • SHA1

    84a92fcfe1954f97aa20fca1c91cb4dd63c4d310

  • SHA256

    40f5dee3911afee1dce2522f4bcedd083b9ba4aa77e3c3b387670d4c74d7c2a9

  • SHA512

    ee7d0e5dee5659c66f6014294659766efa0a021074f8c86cdce358e11a0955304812dc917bc88832b5ac4ba0a2066b00f3c531c26843e22e8856fba0fc6bc537

  • SSDEEP

    24576:2bLgddQhfdmMSirYbcMNgef0z+RdhAdmv:2nAQqMSPbcBVqRdhnv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3182) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_bd06e9e94fe3e88b8ea894f1b7bb5f2b_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-12_bd06e9e94fe3e88b8ea894f1b7bb5f2b_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3784
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2424
  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_bd06e9e94fe3e88b8ea894f1b7bb5f2b_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-12_bd06e9e94fe3e88b8ea894f1b7bb5f2b_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    e9ca5e36120777d87a75ec2c13eee6b3

    SHA1

    90735d4901a2baf6f060746ff14969fad3b80175

    SHA256

    d192211eb036923dd8318f2c889608feb2128db12902ee1c096c249ed01738c4

    SHA512

    373e73ab4627c5000000453738c180ee31e9ad70b0fd61cc7ab9800104060636a27ec8e31f814bbcf14272fbcf44f7ff9ae0b76137f0b2cbf388236dffcb0d1e