Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 12:19

General

  • Target

    2025-01-02_749408122ba1ce8bd22fbf3ac109fc6a_wannacry.exe

  • Size

    5.0MB

  • MD5

    749408122ba1ce8bd22fbf3ac109fc6a

  • SHA1

    418cbdf0072ab84e1be7b7117b6113940838dc51

  • SHA256

    eb52124269c68c39a189b5c036b7a51fe498b58306c2b1ec520ed646276252e4

  • SHA512

    e9f67df4c4d023218e29cd0e8bd0ee43a31a9fb629090d4fad248ed85ce6d077386ff3c5e48bf631ac775d2da60c844bd6ca3ccd88e23f423f91ed5548b623bf

  • SSDEEP

    49152:onjQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SOMEcaEau3R8yAH1plAH:Y8qPoBhz1aRxcSUDk36Sf93R8yAVp2H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3290) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-02_749408122ba1ce8bd22fbf3ac109fc6a_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-02_749408122ba1ce8bd22fbf3ac109fc6a_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2084
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2264
  • C:\Users\Admin\AppData\Local\Temp\2025-01-02_749408122ba1ce8bd22fbf3ac109fc6a_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-02_749408122ba1ce8bd22fbf3ac109fc6a_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    4e1cdea61a29c4fc0a70eb539d51ed99

    SHA1

    3a8d412797d7cd507984e1ea79ae49df31119329

    SHA256

    43ce10c188e01ff16f1e43b96ae62aafac9dae6827e24fdc0af5d8b852f9f1a3

    SHA512

    7e8667211b9713b4abfec29fc675e93413ecf258b1f6c7541f559b2759f6fe936c5511ee5e7ab5af187ed0595f4e9e2bfd833018ab1e0e1d0de734f4a3e1e2fd

  • memory/1464-3-0x0000000000400000-0x0000000000A6B000-memory.dmp

    Filesize

    6.4MB

  • memory/1464-7-0x0000000000400000-0x0000000000A6B000-memory.dmp

    Filesize

    6.4MB

  • memory/2084-0-0x0000000000400000-0x0000000000A6B000-memory.dmp

    Filesize

    6.4MB

  • memory/2084-6-0x0000000000400000-0x0000000000A6B000-memory.dmp

    Filesize

    6.4MB