Resubmissions

22-01-2025 12:04

250122-n8tcpswncm 10

22-01-2025 12:02

250122-n7fp8awmfl 10

13-05-2023 03:12

230513-dp9kgafd59 10

Analysis

  • max time kernel
    600s
  • max time network
    601s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    22-01-2025 12:02

General

  • Target

    2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe

  • Size

    3.6MB

  • MD5

    e35e427cd5131bd06793f67ab0465cb6

  • SHA1

    e47ffcea00cda8aa4d4343807a075ed6bec0c91e

  • SHA256

    fc849725187a811a219d5aecb22ee7d502a0007512386e76899a76be67ebac07

  • SHA512

    7831096c6c2a6663cba2b405e7bc9045d19447f7c63cb107205eb83da65ea6f561111884a310c15da954e0d9a6deb62c201a2b2e4738fc14ef22dcaca78ec422

  • SSDEEP

    98304:X8qPoBhzhaRxcSUDk36SAEdhvxWa9P593R8yAVp2:X8qPehCxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (14596) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:844
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1496
  • C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    PID:4756
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      0990e5f5e1679fb8c77789ae8261378b

      SHA1

      7892d114422d962e1da1d9c72a321801c72a2d2a

      SHA256

      d2e6e6e771de9a1254736dfa538c8f5e069c4fec375d4bee3bbbc11c4e781f7b

      SHA512

      85d7968d218d57ea80fdc0996ca7fe8450c4a0712a32248ed0e6f9b599426c350b5c7642e7e275f102ab81844e50c98262f2fa75c92de5818efe334276cdb18c