Analysis
-
max time kernel
85s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 14:10
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe
-
Size
3.6MB
-
MD5
a2e7604fa2cc092fe143be835606c572
-
SHA1
664131bcef961caec1e3ee959644ffdd362ee45e
-
SHA256
b09ff8ebbf1205d9efae84e56f5b76d2907f6ecd23c86e53da4a5850437414f8
-
SHA512
5cb428923a1f6e4319fcd91e6c20f7ca6ffcb5379ceaea76fd2f524a6925c1bf927c823e4200e5cc3d901c2c53335ef47be08ae05f524e028d0b462028d24bc2
-
SSDEEP
49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQp:yDqPoBhz1aRxcSUDku
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (1307) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 4328 tasksche.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4716 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4716 vlc.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe 4716 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4716 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4520 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2025-01-11_a2e7604fa2cc092fe143be835606c572_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1700
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ConvertNew.asf"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5f76e6ce515db935ed35dc94cc75baa5d
SHA195b25f165418a24f16cb5ddc30c4bb70bc626e53
SHA256284c6775c6ca6179dcdb96ec469ac36bac2084a5d654b29af67c301cfbe043ab
SHA51293b1f29e9419668047e80037b5aa667d7d19904f43801321e9ab786c284a0192d67609491896538d8a9082db3adbb378cc4902fad001d423c22c006167e4163a