Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 11:44

General

  • Target

    2025-01-16_012c03a6868fa67384061590ded150f9_wannacry.exe

  • Size

    5.0MB

  • MD5

    012c03a6868fa67384061590ded150f9

  • SHA1

    2b27731fea98bb88070ee090aa1a23743532bf0f

  • SHA256

    7eb068ba4fb34d27238b7dcc03c0b7bce26395ab5dc99c1d02a771e198767cad

  • SHA512

    9215b4383bffb33ebe430c5a68eb35ae18dc1398fbf4b31fe49dd0539c984490484acda81b2c374a93b481bec450a5ddbea84bd54860c987e6f5e9e6f8194ab5

  • SSDEEP

    49152:QnpEjbcBVWNRx+TSqTdX1HkQo6SAARdhnv:QpUoBaRxcSUDk36SAEdhv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3271) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-16_012c03a6868fa67384061590ded150f9_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-16_012c03a6868fa67384061590ded150f9_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:864
  • C:\Users\Admin\AppData\Local\Temp\2025-01-16_012c03a6868fa67384061590ded150f9_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-16_012c03a6868fa67384061590ded150f9_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:3504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    2.0MB

    MD5

    c9ce6d2b0232daae852c37a154f1d965

    SHA1

    a62ee7da769b716cefb212b89a13510e55821f94

    SHA256

    5b7117480dd572f176d1319185e2117a49de3d9a13bb85365c12d83f18c32bb3

    SHA512

    c669cbfb29b7ea16dd51b22300e36c2f659f28e698ef2161b78089101acc629173f4945fb9bc0e50afbd0ca77fe4c7f6d215a1c0205786028e05d280468708b4