Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe
-
Size
3.6MB
-
MD5
4a2ff475e8b3932ade483bd09ae7777b
-
SHA1
ef64d3ca5c715e689aa56c6dd90b3b8bbb70f66a
-
SHA256
0a11c4b059aa6ce06897fa70c086f24cc5bfff9548ff3ef940b2de389df9a791
-
SHA512
7c003f015a2912c6a798aada575f78f07c7bf318e1deb82f129dec97d71bf2a9e453ff39381e492202c546108a24b9e7d6e9e3c881b753ed3c133cfa791f79ed
-
SSDEEP
98304:y8qPoBhz1aRxcSUDk36SAEdhvxWa9Y3ip2HI:y8qPe1Cxcxk3ZAEUaEi4HI
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3229) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 976 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3984 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-17_4a2ff475e8b3932ade483bd09ae7777b_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5164eea60b926f76e08ef5d6e5e325fa7
SHA1010ed0c6e4f846822f03d6ba16a24b12e5a0bf70
SHA2561e0ddef939eb65734f7d42a774d342853c1c184226a092e413d6ddd32bd21ea2
SHA51239efac051823aac064e4044942c852e5d9847b697a034ac02917d5dec645b86bf4f1854e25c312f48c91ebda2c3878a1fec95bd49cb5a755eef500178d6b5a0d