Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 11:50

General

  • Target

    2024-12-12_714923e33593306391523aca70a1fd09_wannacry.exe

  • Size

    5.0MB

  • MD5

    714923e33593306391523aca70a1fd09

  • SHA1

    06a7f0a7464523c764123983cd6b224028dc7f01

  • SHA256

    4f4dca8ac3dc775f14d258163c498b3e89bc727a4ebb0a10728a3b526d011636

  • SHA512

    63c72525a99d060ee57145cae6517f8f2a1a5f5cd5f70d17b391f382ba6beb45a051dadb6f169b7cb4b9b73b44a40705f817607464b716a27d901658901533f9

  • SSDEEP

    49152:XnAQqMSPbcBVQej/1IkvxJM0H9PAMEcaEau3R8yAH1plAH:XDqPoBhz1rxWa9P593R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3299) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_714923e33593306391523aca70a1fd09_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-12_714923e33593306391523aca70a1fd09_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3896
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:3556
  • C:\Users\Admin\AppData\Local\Temp\2024-12-12_714923e33593306391523aca70a1fd09_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-12_714923e33593306391523aca70a1fd09_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    0d546b10fd18556ea47e87520c851b9c

    SHA1

    68870aad4a61603e1c8771eb72587b3fc1c3262f

    SHA256

    9ec92fed61ed86711baa9b61be131dc37540aed1b5051eb5743c473dc3825c5f

    SHA512

    f58c592d341cf5391c5e1b65fb56fcb2ce9cf1dd0e67e549d154f152e919d9b8c5463c420eb9a99b5cd8b557ab4c363adcaaab87ce942200b9ac06d242eb1cd4