Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 10:24

General

  • Target

    2024-12-21_d0200e9b93e8a4d28c5d50c3dee59906_wannacry.exe

  • Size

    5.0MB

  • MD5

    d0200e9b93e8a4d28c5d50c3dee59906

  • SHA1

    07aa4e0c21252afdb96e98c10632ec89e9308054

  • SHA256

    eaaa39a574b53e6dbcb73c94232f69af02e5babd2a16525d701d072c43945565

  • SHA512

    de4c460cba13f7c9d8d807bb234d943b2c0935b38c3f3ff4bb6653e4328df65c37272c980f9b0c94be2ed0c6628d74034c78120bdd2a91537a859a87174b9914

  • SSDEEP

    49152:2nmMSPbcBV0+TSqTdX1HkQo6SAAc1PAME:ymPoBicSUDk36SAp1P5

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3206) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-21_d0200e9b93e8a4d28c5d50c3dee59906_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-21_d0200e9b93e8a4d28c5d50c3dee59906_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:856
  • C:\Users\Admin\AppData\Local\Temp\2024-12-21_d0200e9b93e8a4d28c5d50c3dee59906_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-21_d0200e9b93e8a4d28c5d50c3dee59906_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads