Resubmissions
16-12-2024 12:21
241216-pjry1szpay 1016-12-2024 12:18
241216-pg2qfaznf1 1016-12-2024 12:06
241216-n93b1a1kcr 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe
Resource
win11-20241007-en
General
-
Target
2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe
-
Size
5.0MB
-
MD5
ca4ce7114be6f14792cc77f2997fc7e6
-
SHA1
f4ca2bdcaed8ccaf20536cdfce85b338b74ebf19
-
SHA256
b6e0541f88b2f91f92b7bcb4928db794f406e822802b1516b804fb1e2933e75e
-
SHA512
d92e534f9ca67397fc17b9b67dd7e3fcca3d8be81d8e4d6f6da5ccc2dd6bb47ac5aef3f78ab274b1a08ca70e2db0dff8944e0e9a0e85eb657b09bfeac3f1864c
-
SSDEEP
12288:GwbLgPluxQhMbaIMu7L5NVErCA4z2g6rTcbckP:VbLgdeQhfdmMSirYbc
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3272) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 2236 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2416 vlc.exe 2708 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2416 vlc.exe Token: SeIncBasePriorityPrivilege 2416 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2416 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe 2708 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2416 vlc.exe 2708 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:292 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-16_ca4ce7114be6f14792cc77f2997fc7e6_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1512
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2984
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Public\Videos\Sample Videos\Wildlife.wmv"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2416
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\DisconnectSwitch.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5781602441469750c3219c8c38b515ed4
SHA1e885acd1cbd0b897ebcedbb145bef1c330f80595
SHA25681970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d
SHA5122b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461
-
Filesize
559B
MD5f098f26ff51b479920dee6458498b7fa
SHA1dff621850c4b0fc445eac9ca36339a14999c8ced
SHA256ba10bfaaff58158bacd1f852e408d1f47a35f3ab10424f26a6fa47601e8892f4
SHA512ddd3516826daeaa8a36644c839cd36dada6a11ec7aebd0770b5e12abe8fa211f669e6e435b6e8b58babc6c51d4562a5bb142c2fb78d634cce6095a279b6b2255
-
Filesize
660B
MD5bf51efcf7ac3c93c224fe11704dfe709
SHA1fdb485e5b63de0250aeace01da84f36c74b497b7
SHA256999739ca4290405737220d2697a8e020d83076adf9627c1230dcfef76772afef
SHA5125c772ba5d69a9af4b09055613861c5569bdc00cef72520ed03d3cbe2a1dd0fc68d93e7c20005cbb980669dc783c88f1a86062f10e21b52fd04b6c414838c554b
-
Filesize
18B
MD5e128ac0000273b1f78d9970bc94c016c
SHA1082e15b8befb6e0f14c89d2216a3b5cef2703720
SHA256cda0d23efd49e20c428ce713e776a51ee3b29f2ab740efe499ef94f4e31d9119
SHA5127b54ac769c76981c27c5d15d9a44356f3d2214857a5556f096354ea83e3c0cb6e6a2a0dabc536a7f2bb829a6d70dbdb11bb701ddc1bd21fcb84ff40557916f3a
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02
-
Filesize
3.4MB
MD5d7eb5e5aab394f614ec0288046e790d0
SHA10dbb29a44164554d592fb699d77feeda780bec0c
SHA256ec0bfa7cc2780afbf1138d9d3c0dd9dd789f61ba6823acfee46de77b31f5202e
SHA512d912195f0f64a83216c4932f5f72219b55abbffa83c29d7a005b0305fc48dbbc17b2da773bbfcbdf0364196aa4655a4b599c7670448cfce551e48186bc91733b