Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 15:45

General

  • Target

    2025-01-15_0099cccd9edee63a16401de6ada30188_wannacry.exe

  • Size

    3.6MB

  • MD5

    0099cccd9edee63a16401de6ada30188

  • SHA1

    337fae1a1df732a03fdf36b8086722029552802d

  • SHA256

    10f11a389f3bc20e9a7123820a6affd7fe354e9fe016a653f1d6151f4236c8cc

  • SHA512

    4d6a908a03f279de051a972342ddc7cf731c4bd73f350b4368c8c462b44f7f344312c856f94baf7fe2ea7ce7cddd238f6f6d751161ffd056528ba753e0b38b39

  • SSDEEP

    98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P59UctAVp2HI:yDqPe1Cxcxk3ZAEUad9c4HI

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3260) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-15_0099cccd9edee63a16401de6ada30188_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-15_0099cccd9edee63a16401de6ada30188_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:840
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:4620
  • C:\Users\Admin\AppData\Local\Temp\2025-01-15_0099cccd9edee63a16401de6ada30188_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-15_0099cccd9edee63a16401de6ada30188_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    53630114dbc51910879f968d0148abdb

    SHA1

    e897138a0f0266d0d0e29e03f8816d08b483054d

    SHA256

    a10c30f76c602083956bdc991486ea598b20b72e395106b39ac14434827688d2

    SHA512

    7cb1ff56e009743c9574ae39034c880e40e0202b17d20ff5dc7cb923103c97428aa8b877c84a729b5f0b47f20cc087816be8eecaf38cd40f475d1a9f1227e769