Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 00:57
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe
-
Size
3.6MB
-
MD5
99faa6d726ad379c5caae924b368ffa3
-
SHA1
a51eae2019167d54dc6a9bc50670b45fe2205a19
-
SHA256
6697db10d79a9d5e1a68c525c43af9d455dc3d0fc8b67e29668395c25b53aec1
-
SHA512
532f28f794a64ae0ead2de2a71f3483a161959f2df3c9d9f5aa756383571cd24f093b61cc978e1d54d15072b0021320c63aef4149c351d7f0e6a134bef42c3b1
-
SSDEEP
98304:XDqPoBhz1aRxcSUDk36SAEdhvxWa9P593R:XDqPe1Cxcxk3ZAEUadzR
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (3132) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4820 tasksche.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4616 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-01-09_99faa6d726ad379c5caae924b368ffa3_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD58be9888bfc3f6e70fba113eb7bfe7dca
SHA19814137c6b36e45172245a547b7324b88d5d867a
SHA256ebdaf5cd5a95bc76397fcf99957ebfb42290817a730a827c4cd7d05555fceeed
SHA51228616b09ad36561069d558f29b608a57ae416312f5fbc85eecd8e8366a6edf972b90f29d137029a39242173f3d5b2ce67396761922603ebdb48ab067d507b998