Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe
-
Size
5.0MB
-
MD5
43bd8a3fe986337d8ea953adb51d66cd
-
SHA1
3c0ccce0c0992c966c75dc637b73550fed44d4a5
-
SHA256
171cc4d8c6485e8e0a3a4541f8a2d0ea3a4b990539e0004b609e8d802ed4a9ef
-
SHA512
ad322b56553bd5e580845379035b2f55a4534999c564dd7450c4e2d253490c3afcab67829df1b6816c37961c5307973a70437b2cddcb27979ab18b10c14f6dca
-
SSDEEP
49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARdhnvxJM0HlAH:Z8qPoBhz1aRxcSUDk36SAEdhvxWa2H
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3371) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4912 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2328 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-14_43bd8a3fe986337d8ea953adb51d66cd_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD52cc5d0062ee9d27af114be24d86925a2
SHA1e20d5308c6b15f45b0c9ae8f39647b0c6bbf03e1
SHA256d03781febf7ce675c6213de134ed8938d240d55b906b697bbd621d8dc9079f95
SHA512627602e00589d007019316b35b759466903be8b0b3026ea5ae25b948c3eeb282fc5d59cf84b079de52fd4e8755b72292702727b5efbb9a47f9ab4e4211079889