Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 19:09

General

  • Target

    2025-01-24_decdd87c07eb32e19ad2efbf487fbec0_wannacry.exe

  • Size

    5.0MB

  • MD5

    decdd87c07eb32e19ad2efbf487fbec0

  • SHA1

    9db039ede4b3c62c8ecc9cd208d8d014ade44fe9

  • SHA256

    2dddc51a550189707aac9f5acc60fd64d5154197195432a134c38de4d968a760

  • SHA512

    80e062652467aaf07c6922b519c93a5b7541995b0567a65628bd0f831c1fe068ca946d3271eb17ad92bc70975a247ec3af76cf0c231e587f33367d24fa3b6ba9

  • SSDEEP

    12288:GvbLgPlu+QhMbaIMu7L5NVErCA4z2g6rTcbckPU82900Ve7zw+K+DHe:2bLgddQhfdmMSirYbcMNgef0Qe

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3225) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-24_decdd87c07eb32e19ad2efbf487fbec0_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-24_decdd87c07eb32e19ad2efbf487fbec0_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1628
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:1284
  • C:\Users\Admin\AppData\Local\Temp\2025-01-24_decdd87c07eb32e19ad2efbf487fbec0_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-24_decdd87c07eb32e19ad2efbf487fbec0_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    bf6217b18d8d35930d9ec3e5152292af

    SHA1

    3c2e4bb8433eb8ed57183dcf1ec13f59cac5ca35

    SHA256

    bac8b9807cff17fab7fc9e7fe0801fbeea79a4cdee9fa4692b5bccca6cec45fc

    SHA512

    2740c1139761d594e3fb4ad893d4dee946282590e301acf4fba8f8d0cfe7f30e8ed2d8fddb35f8bf6c8f4fe818c5fef2fb5062bd96003caa67b37e875fdc5808