Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2024 11:45

General

  • Target

    2024-12-13_248b257c4a97c3a8b817d5ae8b30d059_wannacry.exe

  • Size

    5.0MB

  • MD5

    248b257c4a97c3a8b817d5ae8b30d059

  • SHA1

    a751784725ebc0593e37a81a1980916ed78ff9a7

  • SHA256

    1ac6af4f2f1483f8518072b6f17d2b3c0178599620f0da85f98a1b40f1465259

  • SHA512

    0194f053a50aa02e4335250a009d8da4d39dd8afb8ef0a30f6807bdc14aa5c08dab7fe2171675179541f54a13827d7a303cd4c6682932ecf68fce7d56ee72e4b

  • SSDEEP

    49152:2nAQqMSPbcBVQejxxJM0H9PAMEcaEaue5c/bXZROAx:yDqPoBh9xWa9P59Uc/J

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3318) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-13_248b257c4a97c3a8b817d5ae8b30d059_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-13_248b257c4a97c3a8b817d5ae8b30d059_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2408
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2260
  • C:\Users\Admin\AppData\Local\Temp\2024-12-13_248b257c4a97c3a8b817d5ae8b30d059_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-13_248b257c4a97c3a8b817d5ae8b30d059_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    51a15b3aef21fc8c14e6d349c97e5587

    SHA1

    488d441757a3cde129fe7d73d704ea4965cb2188

    SHA256

    d66c5e9f0cf6591428950b04c977408960c5c3dce91bc5f109fc8debf52ff970

    SHA512

    db3ab889c2625d5057b181dbcd8339bfb4d1a77d613ae98f2b015b18c050a3e8f05ade11763df58cec8df77d930fd46221525b8a6be63b64b5714baff6c039e5