Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe
-
Size
5.0MB
-
MD5
88146097ec244928a99b08ad31a5f8db
-
SHA1
f7e4198d2d155c8ef4733f24648369a61a2e2cdb
-
SHA256
d339b420ad9f5fd2fd2015d3cca66f58fde793dcb71b66f94f1eff0c16f6f578
-
SHA512
72348ff500e116c9f5992dea8fb6e27c4112bd31c634d1e9b5b8c2b4a88c2be6520bfe40b842046ee2099726321f109146c4e23a18e0630c27333ec65851d9a5
-
SSDEEP
49152:VnjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAARyhnv:Z8qPoBhz1aRxcSUDk36SAEyhv
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3153) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 1368 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1808 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-20_88146097ec244928a99b08ad31a5f8db_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:3864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD54f34b024b637ba415f2cd8bd5366f863
SHA1799df00f10f263c1d6944dade4acfc010e68a191
SHA2566e04d7ffb6da43878b0e047340a04afac4a2b25dbfac4b17f2795985bd825868
SHA512c1e92892d4feec4d9706d079a2b816e256fbabc213cc7b5bf61605bb6376bd660e3cabd66ee50038bf39e6e6a50cba38b89391ec49aeda1155f40f236fc8ccc9