Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 03:04

General

  • Target

    2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe

  • Size

    3.6MB

  • MD5

    d41b55996fe1e2d3bc5849e058ad4583

  • SHA1

    d6e74aed7f07e032c4fbd4a92abd101ec7ced1e4

  • SHA256

    78b96431c6e0c46fb3e197ea17e5e4cea523c7a196a97c14c00fdd1d93924e3f

  • SHA512

    1566efadc9a1dc377aa87d169a65098366eaad9c591212366a8ca2da1f38fa7344aacdb8cdf8483ab020254fbc929a9f724ebc1f857e7d772e6b85441d1396f3

  • SSDEEP

    49152:2nAQcX1HkQo6SAARdhnvxJM0H9PAMEcaEau3R8yAH1plAHI:yDak36SAEdhvxWa9P593R8yAVp2HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3219) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1088
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2248
  • C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2344

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\tasksche.exe

          Filesize

          3.4MB

          MD5

          965fec0a2b5060f77373e476a2b150f2

          SHA1

          84f07096f9807f6eb677dfbf70ff9e358dde6aa3

          SHA256

          9a2fea0868d50ee6b3cfe1a9ae92953a7aeb92411aedce278c96be20b8584e78

          SHA512

          622ab063bff73801a099b42bf5cc2afe3c34c925d35ec22f675489065ebdd1fd1786a5ff8703b1fd2b3bfb039d4caebfa26cef78ab22e4945cd55d13325c6483