Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 09:31

General

  • Target

    2025-01-17_4a17783e929158b68bc11a6d8807de24_wannacry.exe

  • Size

    3.6MB

  • MD5

    4a17783e929158b68bc11a6d8807de24

  • SHA1

    53201f077f204b9ad443e41582b6617fd4992038

  • SHA256

    dd494879a7740475c90734edfaedc9ee15690985640fd5bf161b099940bd6861

  • SHA512

    6eb03f4fa29f0cde556ed75ffcc690b9efc7de357be2db69ac91e507e9bb1c7719697d27bec7a6c6c5ffe2c7dea6c96f6f6cfd1684f120135524d15163646a4e

  • SSDEEP

    98304:yDqPoBhz1aRxcSUDk36SAEdhvxWa9P59Uc/:yDqPe1Cxcxk3ZAEUadv

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3339) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-17_4a17783e929158b68bc11a6d8807de24_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-17_4a17783e929158b68bc11a6d8807de24_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:708
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:5004
  • C:\Users\Admin\AppData\Local\Temp\2025-01-17_4a17783e929158b68bc11a6d8807de24_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-17_4a17783e929158b68bc11a6d8807de24_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:4764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    5129b079b6d8f6a8e4ba1cc3ae29bafd

    SHA1

    19507fd6408427cf0879255092dc2f2d9a733578

    SHA256

    1e2b708be4aa37e02b3c5d3916945ea4b38e5156fb016d7063c1d2341d5d7176

    SHA512

    ea4fab989b50f4ae92e76d779b0804c5233c7a1ef48d909af9989b628fdb8a666ac8e8a3b66d90040e706d08ff90afead533a925acdb4766dce8d6e2f939024d