Resubmissions

22-01-2025 12:04

250122-n8tcpswncm 10

22-01-2025 12:02

250122-n7fp8awmfl 10

13-05-2023 03:12

230513-dp9kgafd59 10

Analysis

  • max time kernel
    600s
  • max time network
    602s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-01-2025 12:02

General

  • Target

    2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe

  • Size

    3.6MB

  • MD5

    e35e427cd5131bd06793f67ab0465cb6

  • SHA1

    e47ffcea00cda8aa4d4343807a075ed6bec0c91e

  • SHA256

    fc849725187a811a219d5aecb22ee7d502a0007512386e76899a76be67ebac07

  • SHA512

    7831096c6c2a6663cba2b405e7bc9045d19447f7c63cb107205eb83da65ea6f561111884a310c15da954e0d9a6deb62c201a2b2e4738fc14ef22dcaca78ec422

  • SSDEEP

    98304:X8qPoBhzhaRxcSUDk36SAEdhvxWa9P593R8yAVp2:X8qPehCxcxk3ZAEUadzR8yc4

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (14500) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2280
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1192
  • C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe -m security
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3380
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2592
    • C:\Windows\system32\BackgroundTransferHost.exe
      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
      1⤵
      • Modifies registry class
      PID:1884
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1824

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      d6d3499e5dfe058db4af5745e6885661

      SHA1

      ef47b148302484d5ab98320962d62565f88fcc18

      SHA256

      7ec1b67f891fb646b49853d91170fafc67ff2918befd877dcc8515212be560f6

      SHA512

      ad1646c13f98e6915e51bfba9207b81f6d1d174a1437f9c1e1c935b7676451ff73a694323ff61fa72ec87b7824ce9380423533599e30d889b689e2e13887045f

    • C:\Windows\tasksche.exe

      Filesize

      3.4MB

      MD5

      0990e5f5e1679fb8c77789ae8261378b

      SHA1

      7892d114422d962e1da1d9c72a321801c72a2d2a

      SHA256

      d2e6e6e771de9a1254736dfa538c8f5e069c4fec375d4bee3bbbc11c4e781f7b

      SHA512

      85d7968d218d57ea80fdc0996ca7fe8450c4a0712a32248ed0e6f9b599426c350b5c7642e7e275f102ab81844e50c98262f2fa75c92de5818efe334276cdb18c