Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 03:32

General

  • Target

    2025-01-27_dc9027db8ffbd7789f1ab3cffbbb7c74_wannacry.exe

  • Size

    3.6MB

  • MD5

    dc9027db8ffbd7789f1ab3cffbbb7c74

  • SHA1

    d2e6d54aafda269e628c9678e8f5008552a23905

  • SHA256

    861a5d16e5e3ed14acd291b0b8726ddbd3accfccc48c051ad6155c2ac010d6f4

  • SHA512

    eb12606c0818a01cb472999828df2428f251f9caff6b6177bc222ab6f3cf66b6a99d9783dae8e65ea8d334e5e1349b180d32213b49b25b9cdad606aa69da164d

  • SSDEEP

    49152:2nAQqMSPbcBVQej/1INRx+TSqTdX1HkQo6SAA4hnvxJM0H9PAMEcaEau:yDqPoBhz1aRxcSUDk36SABhvxWa9P59

Malware Config

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Contacts a large (3307) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Executes dropped EXE 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-27_dc9027db8ffbd7789f1ab3cffbbb7c74_wannacry.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-27_dc9027db8ffbd7789f1ab3cffbbb7c74_wannacry.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2848
    • C:\WINDOWS\tasksche.exe
      C:\WINDOWS\tasksche.exe /i
      2⤵
      • Executes dropped EXE
      PID:2408
  • C:\Users\Admin\AppData\Local\Temp\2025-01-27_dc9027db8ffbd7789f1ab3cffbbb7c74_wannacry.exe
    C:\Users\Admin\AppData\Local\Temp\2025-01-27_dc9027db8ffbd7789f1ab3cffbbb7c74_wannacry.exe -m security
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tasksche.exe

    Filesize

    3.4MB

    MD5

    42e2e3bb7d23af2bd402aa8ffe89eacc

    SHA1

    2224257216d3168798c7782e668de7ca2f3a8554

    SHA256

    016d016763f10051b7fc280f144beca5e64fed102fb605fe1adf129e21803ae9

    SHA512

    e281fb4e7f16e68505a49c4fd9c8bf8e1dc18528d74eaf27e33acac1d8f18e90b0615120913c54eb72ad36d43672a62cd75a721af3961cb8a151956d8780fb6b