Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 23:08

General

  • Target

    2025-01-25_6e0d3e0068cc325ebe65a893cb6b26d3_wannacry.exe

  • Size

    5.0MB

  • MD5

    6e0d3e0068cc325ebe65a893cb6b26d3

  • SHA1

    27e29d503c76ece44d3b4de0d4b4b2e71bbf5ed6

  • SHA256

    230999d01598f82dcfe74252740c61f0decfedd1930db1edc71943a0e1ac0ed5

  • SHA512

    dbe6cccdbfb530e133f9322f1009ca250e612d3fec5d1aca5fefd543a13629088ecc385ecd4fcba3353963dbe0241bb43f44e5cf4d8d038c1a2c8db13bb9a174

  • SSDEEP

    98304:XDqThz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2H:XDqV1Cxcxk3ZAEUadzR8yc4H

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (2929) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_6e0d3e0068cc325ebe65a893cb6b26d3_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-25_6e0d3e0068cc325ebe65a893cb6b26d3_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2140
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2748
  • C:\Users\Admin\AppData\Local\Temp\2025-01-25_6e0d3e0068cc325ebe65a893cb6b26d3_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-25_6e0d3e0068cc325ebe65a893cb6b26d3_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    db04689892805f730e9f5f0c44f379a8

    SHA1

    45a10041560c8ab99dc51a8b91cf56c09a4b9180

    SHA256

    e775adf5bb6a952ea8ecb1aedf1be5f02c637939f5676e03cd5332d2af3eaea2

    SHA512

    09bd4ade7a850d9e83500a6a770556dd45fa2e4bf2a403613318ad80be2a75d99737bb2c2b037e10b75f8c36eb2153e1a6420c038125ab1703e1c3519e9e7d79