Resubmissions
22-01-2025 12:04
250122-n8tcpswncm 1022-01-2025 12:02
250122-n7fp8awmfl 1013-05-2023 03:12
230513-dp9kgafd59 10Analysis
-
max time kernel
1800s -
max time network
1802s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 12:04
Static task
static1
Behavioral task
behavioral1
Sample
2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe
-
Size
3.6MB
-
MD5
e35e427cd5131bd06793f67ab0465cb6
-
SHA1
e47ffcea00cda8aa4d4343807a075ed6bec0c91e
-
SHA256
fc849725187a811a219d5aecb22ee7d502a0007512386e76899a76be67ebac07
-
SHA512
7831096c6c2a6663cba2b405e7bc9045d19447f7c63cb107205eb83da65ea6f561111884a310c15da954e0d9a6deb62c201a2b2e4738fc14ef22dcaca78ec422
-
SSDEEP
98304:X8qPoBhzhaRxcSUDk36SAEdhvxWa9P593R8yAVp2:X8qPehCxcxk3ZAEUadzR8yc4
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Contacts a large (50090) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 1 IoCs
pid Process 3160 tasksche.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\tasksche.exe 2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133820211133580038" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe Token: SeShutdownPrivilege 2288 chrome.exe Token: SeCreatePagefilePrivilege 2288 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe 2288 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3688 2288 chrome.exe 93 PID 2288 wrote to memory of 3688 2288 chrome.exe 93 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 396 2288 chrome.exe 94 PID 2288 wrote to memory of 4336 2288 chrome.exe 95 PID 2288 wrote to memory of 4336 2288 chrome.exe 95 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96 PID 2288 wrote to memory of 3328 2288 chrome.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe"C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:392 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i2⤵
- Executes dropped EXE
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exeC:\Users\Admin\AppData\Local\Temp\2023-05-12_e35e427cd5131bd06793f67ab0465cb6_wannacry.exe -m security1⤵
- System Location Discovery: System Language Discovery
PID:1972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff9276dcc40,0x7ff9276dcc4c,0x7ff9276dcc582⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2204 /prefetch:32⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3144,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3728,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3804,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4024,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4372,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3228,i,9718506411410598211,12288538782427535249,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3296 /prefetch:82⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1108
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5231c27bf16810ba4f7ba318602a6adb1
SHA110fbca4d21a8bb01445c96b8a7f60ccb8ba6df79
SHA2565a9800154323e54897051287f2911942e6cde3fd8eb071edc27c67263b71f667
SHA51270447caaef44a511ae9ec1550813f9ff3bea34b391b726dc3b828144456e510231c011a719f5a9377012a8841942f89f0ae9b678ef09bc5272011ed2e00f710f
-
Filesize
1KB
MD5296cc50cfefb26458126766f14a53c87
SHA1c11bf1ba1b5331ef697334bfe4e4519a071a8cea
SHA25611a9cf43efeb6d4d9b84d449ecc8c58baa760348a7f5ca082a257b672ddf93a8
SHA5126141f7e9accd3e1a1d7abaae959df306e952062fcf18a436c1c9e3bf562fa8d53b1d8306b9252099a255873eaa2176768b8f9134a6174f7d30c723095880831b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD52f4f51277cf428ee086ab68409856020
SHA1a81bb855c56d6bb8cfb7ab9b7eaeb97c045877f6
SHA256ee0e5ebb63daab2e670f49bec52491650e375434617705788b31365e4e9b281a
SHA512889098c427011f6f657c43e887a51a95340ededc7f5f980ab14214200c8367300d7e800d99c30b4aa392710aa07d9bd0a922a16123f01d0142b81c9c2092db8f
-
Filesize
118KB
MD5e6ad99abd7aa61efeed156c67446cd52
SHA16420e70feece82288c5955b700a146a270cbfcf4
SHA256be67d618bb40c69b2e8eab6af99c1c504791ae66e534d4396ddde8d65ffbe6c9
SHA5123159027c315ed56de7d64525965eca7043a14b33b7b397d461eea22ccc3d466ce384aedb9d9ff7de8104f419e361785d43989e47b1f66d40366be0359c3d8b3c
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3.4MB
MD50990e5f5e1679fb8c77789ae8261378b
SHA17892d114422d962e1da1d9c72a321801c72a2d2a
SHA256d2e6e6e771de9a1254736dfa538c8f5e069c4fec375d4bee3bbbc11c4e781f7b
SHA51285d7968d218d57ea80fdc0996ca7fe8450c4a0712a32248ed0e6f9b599426c350b5c7642e7e275f102ab81844e50c98262f2fa75c92de5818efe334276cdb18c