Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 03:04

General

  • Target

    2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe

  • Size

    3.6MB

  • MD5

    d41b55996fe1e2d3bc5849e058ad4583

  • SHA1

    d6e74aed7f07e032c4fbd4a92abd101ec7ced1e4

  • SHA256

    78b96431c6e0c46fb3e197ea17e5e4cea523c7a196a97c14c00fdd1d93924e3f

  • SHA512

    1566efadc9a1dc377aa87d169a65098366eaad9c591212366a8ca2da1f38fa7344aacdb8cdf8483ab020254fbc929a9f724ebc1f857e7d772e6b85441d1396f3

  • SSDEEP

    49152:2nAQcX1HkQo6SAARdhnvxJM0H9PAMEcaEau3R8yAH1plAHI:yDak36SAEdhvxWa9P593R8yAVp2HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3285) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:4260
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4424
  • C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2024-12-22_d41b55996fe1e2d3bc5849e058ad4583_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    965fec0a2b5060f77373e476a2b150f2

    SHA1

    84f07096f9807f6eb677dfbf70ff9e358dde6aa3

    SHA256

    9a2fea0868d50ee6b3cfe1a9ae92953a7aeb92411aedce278c96be20b8584e78

    SHA512

    622ab063bff73801a099b42bf5cc2afe3c34c925d35ec22f675489065ebdd1fd1786a5ff8703b1fd2b3bfb039d4caebfa26cef78ab22e4945cd55d13325c6483