Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 19:00

General

  • Target

    add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13N.exe

  • Size

    5.0MB

  • MD5

    dcd481dba5974e52fcdf0938c1b19590

  • SHA1

    776221aaf08aa63593a531502b5558dde14eaf9a

  • SHA256

    add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13

  • SHA512

    7e866e9102fda7416a9a2b3894743896161453903383e21d718ecb5e6508319361f17f618ce510ac44c3a67a4e4ae5e8db6948de2d564a2219e62e97a53710fb

  • SSDEEP

    6144:eE9l9ynRIYVTH5DgSgNajldktM0XXrCIai62XVIwYQuy8DLq1eN:e1bLgmluCti62lIMu7L5N

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (2473) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13N.exe
    "C:\Users\Admin\AppData\Local\Temp\add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:3936
  • C:\Users\Admin\AppData\Local\Temp\add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13N.exe
    C:\Users\Admin\AppData\Local\Temp\add3c3558755047086dca5f6bf13fabd46c42b3b0c3a9c51a015bd0e3ef92e13N.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads