Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe
-
Size
2.2MB
-
MD5
1b49978f9a03ef4f36890b61bf838fed
-
SHA1
5142c29081f89af8631771fd4f557585bfa18fc8
-
SHA256
24e166f94f190c9dcbde6742a2561e92071b62be7f00ea67050bee380d7ce103
-
SHA512
1d82eac6d18251c96dfef16a615e8ff004027795bc075819bb4de92aa678e2a70c5fd32fc649b01e70f13a0a71aa389f65473a438d4b1f8dfeea1c70c0073266
-
SSDEEP
6144:eE9l9ynqIYVTH5DgSgNajldktM0XXrCIagQhMV9qbBLIwYSv3AiiVjAqZfAgbJ3q:eebLgmluCtgQhMbaIuAvVLJAmd3An
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3241) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 580 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\FQP01GU6.txt 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\FQP01GU6.txt 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\OUX80Z9P.txt 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\OUX80Z9P.txt 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2820 580 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasksche.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f6-68-1a-4f-84\WpadDecisionTime = a07ede239d55db01 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3}\WpadDecision = "0" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f6-68-1a-4f-84\WpadDecisionReason = "1" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3}\WpadDecisionTime = a07ede239d55db01 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f6-68-1a-4f-84 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3a-f6-68-1a-4f-84\WpadDecision = "0" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f011d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3}\WpadDecisionReason = "1" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3}\WpadNetworkName = "Network 3" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3}\3a-f6-68-1a-4f-84 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{C2DDDD89-2EE2-483A-940C-2419C3B5BCB3} 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 580 1720 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe 31 PID 1720 wrote to memory of 580 1720 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe 31 PID 1720 wrote to memory of 580 1720 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe 31 PID 1720 wrote to memory of 580 1720 2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe 31 PID 580 wrote to memory of 2820 580 tasksche.exe 32 PID 580 wrote to memory of 2820 580 tasksche.exe 32 PID 580 wrote to memory of 2820 580 tasksche.exe 32 PID 580 wrote to memory of 2820 580 tasksche.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 363⤵
- Program crash
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2024-12-24_1b49978f9a03ef4f36890b61bf838fed_wannacry.exe -m security1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d96d2b632caa0daeaf3dcf7adde853c5
SHA1387470e1ef47acdfc8f3d553cadf94f59880346a
SHA256ca9b1d16046c426c99ab759c7d8c109e3b6b631cbbeb6ae60a78ea21e60bb90d
SHA512df84732aa82b1edfef67c5de50dec58c5fb25df47906b849928cfa11c301d4a1fc02b6aafd51189c7553e5caabe0143dd07cc3ddc42dfd4a569ff1038fce5524